TechNet Augusta 2024 Supporting Partner Opportunities
AFCEA has developed an enhanced supporting partner program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories such as Patron Packages, Branding and Individual Opportunities.
Deadline to purchase a Supporting Partnership is July 10th.
Visit the AFCEA YouTube Channel for event recordings. Click here to access.
Sunday, August 18, 1:00 PM - 4:00 PM
- Room: Olmstead Street Level Foyer
Tracks:
Monday, August 19, 7:30 AM - 4:30 PM
- Room: Olmstead Street Level Foyer
Tracks:
Monday, August 19, 8:00 AM - 9:00 AM
Adversaries have demonstrated an increased capability to penetrate and degrade the operational technology (OT) and control systems of our critical infrastructure, impacting mission readiness. Today’s military installations operate in an expanded and connected battlespace that exponentially increases cyber threats and vulnerabilities in OT security. Weapons systems are also OT, and must maintain combat effectiveness in dynamic, physical, kinetic environments, while relying on computer logic to operate reliably and safely for warfighters. This training seminar will (1) review the current DoD OT cybersecurity protocols and trends, (2) closely examine today’s threat landscape, and (3) provide Tactics, Techniques, and Procedures (TTPs) for...
...read more...
Speaker(s)
Tracks:
Monday, August 19, 8:00 AM - 5:00 PM
- Room: Eisenhower Lakes Golf Course
Click here for details, sponsorships, and registration...
Monday, August 19, 8:00 AM - 6:00 PM
- Room: Georgia Cyber Center Auditorium
Tracks:
Monday, August 19, 8:30 AM - 11:30 AM
This interactive, hands-on workshop is designed to familiarize participants at various skills levels with how to investigate incidents using Splunk Enterprise Security (ES), and Splunk SOAR (formerly known as Phantom). You will work in Splunk ES to identify security issues, open and conduct investigations, and then pivot to Splunk SOAR to orchestrate actions based on what is uncovered. The workshop leverages the popular Boss of the SOC (botsv3) dataset and is laid out in an interactive format. Users will leave with a better understanding of how Splunk Enterprise Security, and Splunk SOAR can be used within security operations to quickly...
...read more...
Speaker(s)
Tracks:
Monday, August 19, 9:00 AM - 7:00 PM
- Room: 2nd Floor Above Hotel Main Lobby
Tracks:
Monday, August 19, 9:30 AM - 10:30 AM
Over the last 18 months many of us have transformed from consumers of Artificial Intelligence (AI) to users with ChatGPT and other generative AI technologies. Yet, many still labor with defining exactly what AI is and how it is transforming cybersecurity.
In this session, we will define AI, the types of AI, and the various approaches - providing a framework for understanding the practical implications of AI within cybersecurity. At the end of the session, you will be able to identify the concepts that are foundational to AI and major high-level approaches to machine learning and deep learning and how it...
...read more...
Speaker(s)
Tracks:
Monday, August 19, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center
The PAI/OSINT 2024 Capture the Flag (CTF) will be a jeopardy style event where participants will be expected to find information on the live internet. This CTF will be open to all cyber professionals and anyone that would like to test their digital discovery skills. Topics covered for this event will include File Metadata, Search Engines, Social Media, Geolocation Analysis, and Pivoting.
This is an IN PERSON individual event. Individuals will not be authorized to participate remotely.
Click here to register and for additional details....
Tracks:
Monday, August 19, 11:00 AM - 12:00 PM
This presentation will discuss the transformative impact of Artificial Intelligence (AI) on the dynamics of cyber warfare, focusing on the convergence of offensive and defensive strategies. We will cover how AI technologies are reshaping traditional attack and defense models and enabling cybersecurity professionals to adopt a more proactive, adaptive, and holistic approach to safeguarding networks. Covering a series of case studies and garnering insights from industry experts, attendees will gain a comprehensive understanding of how AI is revolutionizing cyber operations and driving innovation in the field....
Speaker(s)
Tracks:
Handout(s)
Monday, August 19, 1:00 PM - 2:00 PM
The increasing adoption of AI and related technologies globally provides a massive opportunity for humanity. However, as is the case with any disruptive technology, there are also threats that introduce significant risks, not only to cyber security. Effectively managing these inherent risks is key to leveraging AI in a balanced way. The audience will come away with a better understanding of the conflicts in the adoption of AI....
Speaker(s)
Tracks:
Handout(s)
Organizations today operate within a multifaceted IT ecosystem, encompassing diverse operating systems, on-site data centers, cloud environments, and increasingly, large language models (LLMs) and datasets. This hybrid AI infrastructure introduces unique challenges and considerations for incident response.
This presentation delves into the complexities of incident response in this evolving landscape, emphasizing the importance of adaptability, specialized knowledge, and robust security measures.
In this Presentation learners will gain knowledge of:
1) Attack methods used by AI attackers:
a. Automated Phishing attacks
b. Malware creation and evasion
c. Vulnerability Scanning and exploitation
d. Social engineering
e. Improved DDOS attacks
...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 19, 2:00 PM - 5:00 PM
Monday, August 19, 2:30 PM - 3:30 PM
Cybersecurity Maturity Model Certification (CMMC) and the rest of the DoD rules for safeguarding Controlled Unclassified Information (CUI) provide a stout framework for combating cyber threats. The question is at what cost and what will they actually accomplish?
DoD admits that just the CMMC assessment and certification requirements impose recurring contractor investments from hundreds of thousands to millions of dollars depending on contractor size. In addition, there is no meaningful limit to what data can be covered, how it will be managed or how the requirements can be tailored. The cost problem is further amplified with mandatory flow downs and broad-based...
...read more...
Speaker(s)
Tracks:
Handout(s)
AI is rapidly transforming mental health care, with veterans at the forefront. Since the early days of AI in psychology(1990s), researchers have explored its potential to support traditional therapies. This session will delve into AI use for veterans' mental health, examining both benefits and risks. We'll explore the timeline, from early AI chatbots offering basic support (1990s-2010s) to today's sophisticated models that analyze data to identify mental health issues like depression and PTSD. These models can flag veterans who need intervention before symptoms worsen.
The session will then discuss exciting possibilities, such as 24/7 access to self-management tools and anonymous support...
...read more...
Speaker(s)
Tracks:
Monday, August 19, 4:00 PM - 5:00 PM
The HISPI Cerebellum Think Tank is focused on ensuring ethical and trustworthy development of AI especially when working for the Federal Agencies, including DoD.The increasing adoption of AI and related technologies globally provides a massive opportunity for humanity. However, as is the case with any disruptive technology, there are also threats that introduce significant risks. Effectively managing these inherent risks is the key to leveraging AI in a balanced way. Attendees should learn what the HISPI Think Tank -- Project Cerebellum is about. They should learn the why and how of the HISPI Trusted Artificial Intelligence (TAI) Model Top 20...
...read more...
Speaker(s)
Tracks:
Handout(s)
CNN, Fox News and MSNBC; they all know. If you are paying any attention, you see what’s happening. Organizations and governments are relying more and more on online cloud services. As a result, sensitive data such as personnel administration, medical information, mission logs, system vulnerability assessments and other sensitive organizational data are unknowingly exposed to our adversaries.
In this talk we will look at the security around utilizing the Cloud and implementation of best practices to secure the data stored on them. Further, we will be exploring ways to move the data securely and dynamically as environments change and evolve. I’ll...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 6:30 AM - 5:30 PM
- Room: Olmstead Street Level Foyer
Tracks:
- Room: 2nd Floor Above Hotel Main Lobby
Tracks:
Tuesday, August 20, 7:00 AM - 8:00 AM
- Room: Plaza Lobby/Riverwalk Hallway
Tracks:
Tuesday, August 20, 8:00 AM - 9:15 AM
Watch Recording...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 9:00 AM - 11:00 AM
Tuesday, August 20, 9:00 AM - 5:30 PM
Tuesday, August 20, 9:30 AM - 9:50 AM
The Army's integration of Cyberspace Operations into Multi-Domain Operations (MDO) involves leveraging advanced technologies and strategic planning to enhance operational effectiveness across all domains. At the tactical edge, where bandwidth and resources may be limited, Palo Alto Networks' solutions are designed to be efficient and effective. Our solutions are optimized for performance in constrained environments without compromising on security effectiveness. Robustness and reliability are critical, ensuring continuous operation even in challenging conditions where units operate in dynamic and potentially hostile environments.
At Palo Alto Networks we know that Cyber as a Domain has to be fully integrated into the commander’s operational...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 9:30 AM - 10:30 AM
Listen to recording...
Speaker(s)
Tuesday, August 20, 9:30 AM - 10:45 AM
The Acquisition Community has progressed along an epic journey through a digital transformation. Learn about some of the successes along the way and upcoming initiates charted for the future.
Watch Recording...
Speaker(s)
Tracks:
Tuesday, August 20, 10:00 AM - 10:20 AM
The USG is largely outspent by competitors / adversaries in content creation and message dissemination in the information environment (IE) and existing approaches have proven insufficient due to resource and time constraints. The USG is outspent on information operations in the order of billions of dollars and the deluge of adversary misinformation and disinformation (including full-time broadcast media with locally tailored content, online news, syndicated content, and BotNets) is challenging to track and assess.
Solution - Peraton’s Operationally Dynamic Information Network (ODIN) provides comprehensive analysis and assessment of the IE. ODIN leverages an array of AI-enabled data capabilities, combined with social...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center
The Capture the Flag (CTF) will be a jeopardy style event. This CTF will be an IN PERSON or Virtual event and open to all cyber professionals in the military and industry. Topics covered for this event will include Binary Exploitation, Reverse Engineering, Web Exploitation, Cryptography, Forensics, and Security.
Teams will be limited to FOUR members maximum. Teams with less than FOUR team members, can annotate “N/A” as the team member on the registration form.
Click here to register and for more information....
Tracks:
Tuesday, August 20, 10:30 AM - 10:50 AM
SAIC’s Tenjin enables warfighters to sense, make sense, and act in near real time in Denied Degraded Intermittent and Limited (DDIL) bandwidth environments. It provides Artificial Intelligence, Machine Learning (AI/ML), and data analytic capabilities in DDIL environments using SAIC’s Edge Services Architecture (ESA), a lightweight, open architecture that is flexible and adaptable to support distributed operations for the Army of 2030 and beyond. Developed using ESA, Tenjin is small form factor deployable software that performs sub-second aggregation and fusion of real-time data at the edge. It hosts multiple AI models, including object detection, entity recognition, and speech to text, enabling...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 10:30 AM - 11:30 AM
The increasing prevalence of cyber threats highlight the critical need for the Department of Defense to have a capable and ready cyber workforce. Developing such a workforce involves a multi-disciplinary approach across policy, program development, strategy, data analytics, and data science that will drive innovation and development across the cyber workforce.
This presentation will provide information on the DoD CIO’s by Cyber Workforce Strategy Implementation Plan, DoD Cyber Workforce Framework, DoD 8140 Cyberspace Workforce Management and Qualification Program, Academic Outreach, and Cyber Excepted Service.
Through targeted initiatives, investment in personnel, and a commitment to continuous development activities, we can build and sustain...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 10:45 AM - 11:45 AM
This discussion will focus on the most trending cybersecurity threats to our infrastructure and supply chain. The discussion will discuss how cybersecurity threats are often combined with physical attacks on the same infrastructure and supply chain. There will be examples given of past threats, those both mitigated and carried out. The nucleus of the discussion will be on recognizing signs of a coming cybersecurity threat and when suspicions might be warranted. Attendees should come away with a better understanding of recognizing the security threats, where the trends are leading, cybersecurity threats in the future, and to whom to report threats...
...read more...
Speaker(s)
Tracks:
During this session, MAJ Harryman will provide the audience an overview of Cyber Quest 2024 covering the following topics: DoD and industry participants, planning phases, experiment objectives, execution CONOPS, and outcomes. ...
Speaker(s)
Tracks:
Handout(s)
In today's complex battlespace, secure and reliable communication is fundamental to achieving mission success. This panel will explore the next generation of secure communication technologies and their applications within the Army. Panelists will discuss cutting-edge developments in areas such as software-defined radio, radio frequency and optical communications, encryption methodologies with quantum resistance, and the role of drone and vehicle swarms. Additionally, the panel will address critical aspects of reliability through the lens of systems engineering, as well as strategies to counter adversarial tactics like jamming and intercepting.
The learning objective of this panel is to gain a deeper understanding of...
...read more...
Speaker(s)
Tracks:
This discussion will cover the integration of the data fabric ICW Community of Interest (COI) from the Army's Big Data Platform to the tactical edge (SBU-E). We will also cover the capabilities and vertical flows at the enterprise, regional, and tactical (DODIN-A) levels and what storage, compute, and bandwidth impact and complexities at all echelons. Endstate will be to provide Commanders' situational awareness and decision-making through continued working groups in DCO Portfolio to provide the Army a viable solution towards mission success.
Listen to recording...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 11:00 AM - 11:20 AM
Electronic warfare (EW) is in a constant state of change, driven by evolving adversarial capabilities, advancements in hardware platforms, and the rapid growth of machine learning (ML) capabilities. Electronic Attack (EA) techniques are particularly sensitive to these underlying developments. The Army must adopt a comprehensive strategy that addresses these challenges while rapidly deploying cost-effective solutions using existing hardware.
At Parsons, our approach to ML solution development—including our EW and EA products—is influenced by three interconnected areas:
Core Research and Development: We drive advancements in electromagnetic signal analysis and response optimization through focused research initiatives. This includes advanced model architectures, efficient hardware integration,...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 11:00 AM - 1:00 PM
Tuesday, August 20, 11:30 AM - 11:50 AM
Oracle is a data company that spends hundreds of millions of dollars a year on research and ways to enhance how users can interact with their data. Oracle database ingests all types of data from all types of sensors, and with configuration, can easily integrate all that data regardless of the type or sensor origin. From those relationships, commanders get analysis and decision support.
Once data is consolidated into a repository, your organization is ready for the next step: self-service analytics. Oracle Analytics delivers complete self-service analytics in an intuitive user interface built for everyone, from business users to data scientists....
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 11:45 AM - 12:45 PM
The use of reconnaissance and strike unmanned systems in the war in Ukraine has completely changed the tactics of combat operations. Strike drones have become one of the primary means of destroying enemy personnel and equipment, especially given the limited supplies of artillery and missile weapons, ammunition, and the reduced effectiveness of frontline aviation due to the saturation of air defense systems in the frontline area. Additionally, long-range UAVs have become practically the only weapon for the Armed Forces of Ukraine that can be used to strike strategic targets deep within Russia.
However, the effectiveness of tactical UAVs is limited by...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 12:00 PM - 12:45 PM
Members of the Army Acquisition Community will field Q&A related to the 1000-1115 "Transform" Session.
Listen to recording...
Speaker(s)
Tracks:
Tuesday, August 20, 1:00 PM - 2:00 PM
Watch Recording...
Speaker(s)
Tracks:
- Room: Reynolds Street/Outdoor Pavillion
Tracks:
Tuesday, August 20, 2:10 PM - 2:30 PM
As missions become more distributed, today’s warfighters are operating in increasingly complex IT environments. To operationalize data and make the most effective decisions, more and more commands are turning to intelligent automation, which combines artificial intelligence (AI), correlation, and analytics to streamline repeatable processes with minimal human intervention. This technology equips warfighters with actionable insights across an organization’s entire IT ecosystem, leading to enhanced efficiency, productivity, and user satisfaction.
To tackle these challenges, the concept of "shifting left" has become more crucial than ever. This approach focuses on resolving issues at the fastest speed and lowest technical level possible to enhance...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 2:15 PM - 3:15 PM
1415-1430: Ms. Swanson Overview of MOSA/Interoperability
1430-1515: ALIGN: How does DE enable interoperability and the adoption of MOSA
Watch Recording...
Speaker(s)
Tracks:
Panelists from the United States Secret Service (USSS), the Federal Bureau of Investigation (FBI), the Georgia Bureau of Investigation (GBI), and the Cybersecurity and Infrastructure Security Agency (CISA) will discuss on security incidents and the resultant investigation process for supply chain companies and critical infrastructure partners.
The focus of the discussion will be how law enforcement and the CISA will work with these companies and partners pre, during, and post incident.
Panelists would also engage on nation state threats and the best
practices around hunt investigation concerning those higher level attacks. Attendees will learn how the panelists’ agencies work together with companies and...
...read more...
Speaker(s)
Tracks:
As the Army’s Cyber and Electromagnetic Warfare School and Branch turn ten years old this year, the School’s Historian along with key members from the beginning to today reflect on major milestones during this historic first decade.
Listen to recording...
Speaker(s)
Tracks:
As methodologies towards non-repudiation improve, so too must efforts to apply such methodologies to sectors that stand to benefit the most. At its core, personal Identity is the very foundation of all we do - finance, ownership, civic participation; but identity issuance has greatly lagged behind techniques to attack identity, as evidenced by society’s continuing reliance on easily forged identity numbers to prove identity. Until identity issuance becomes cryptographically secure, such identity cannot be positively used for non-repudiation without a high risk of fraud.
Such unreliability of data availability and lack of absolute non-repudiation can be...
...read more...
Speaker(s)
Tracks:
Listen to recording...
Speaker(s)
Tracks:
Tuesday, August 20, 2:40 PM - 3:00 PM
Core computing functionality commonly found in data centers and in the cloud can now be deployed at the tactical edge—data protection capabilities must transition with that move.
For example, military operations at edge often require unique situational data to be shared with coalition partners and must utilize core-level security protocols like zero trust to ensure data is only shared on a need-to-know basis.
However, many challenges often stand in the way of extending core-level security to the edge. Harsh environments; bandwidth-limited and disconnected sites; overrun or hostile scenarios; and constraints related to size, weight, and power have made it difficult to employ...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 3:00 PM - 5:15 PM
Tuesday, August 20, 3:15 PM - 4:15 PM
Modernizing networks and network operations is no easy task. The initiative has expanded beyond the network edge to require visibility into the network delivery paths between war fighters, managed infrastructure, and mission-critical applications across hybrid and multi-cloud environments. This requires a step-by-step approach to unlocking new visibility into applications, traffic flows, distributed locations, and managing cloud workflows in order to maintain good end-user experiences.
In this session, you will discover the 5 criteria that need to be in place in order to modernize successfully as well as success stories from other enterprises who followed the same recipe. Broadcom is pioneering active...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 3:30 PM - 4:15 PM
Watch Recording...
Speaker(s)
Tracks:
Tuesday, August 20, 3:30 PM - 4:30 PM
Using the framework developed by Army Cyber at West Point, we will show the process needed for development of a scenario to fully test the physical and virtual aspects of multiple components
of critical infrastructure to include the cyber aspects. The interdependencies are complicated. This discussion includes the initial discovery and network evaluation; it will emphasize current events across the nation and the local environment to include weather, social, etc. Participants must successfully navigate and keep services working. Many companies, organizations and agencies are not fully aware of resources and requirements needed during a crisis. Planning is
key and knowing who and...
...read more...
Speaker(s)
Tracks:
As the founder of the Digital Forensics & Artificial Intelligence Research Lab, Dr. Dorai will share her expertise in analyzing mobile and IoT devices using machine learning. The talk will cover the fundamentals of AI, its implications for law enforcement, and practical applications for officers and collaborative efforts with industry partners. Additionally, Dr. Dorai will discuss the Targeted Data Extraction System (TDES), addressing the complexities of user data analysis and the privacy and security challenges of IoT device artifacts. Attendees will gain insights into recent advancements in digital technology and real-world examples from the research lab. The session will conclude...
...read more...
Speaker(s)
Tracks:
JP 3-12 defines a cyberspace capability as “A device or computer program, including any combination of software, firmware, or hardware, designed to create an effect in or through cyberspace”. Along with Cyberspace Operators, Exploitation Analysts, and Digital Network Exploitation Analysts, Cyberspace Capability Developers (CCD) are one of USCYBERCOM’s four “pacing item” work-roles. The US Army Cyber School began training CCDs in 2020. Since then, 60 officers and 32 warrant officers have completed training, graduating as fully qualified and certified CCDs to support the cyber operational force.
Listen to recording...
Speaker(s)
Tracks:
This discussion will cover the requirements that enable the Army to transform to an intelligent and threat informed network that provides robust and resilient transport infrastructure that enables mobile, dispersed, tactical communications with the necessary throughput to support data-intensive technologies such as artificial intelligence, fault-tolerance, cloud-based communications, sensing technologies, and advanced mission command systems to allow the Army to fight in MDO.
Listen to recording...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 4:00 PM - 5:30 PM
Wednesday, August 21, 7:00 AM - 9:00 AM
- Room: Plaza Lobby/Riverwalk Hallway
Tracks:
Wednesday, August 21, 7:00 AM - 6:00 PM
- Room: Olmstead Street Level Foyer
Tracks:
- Room: 2nd Floor Above Hotel Main Lobby
Tracks:
Wednesday, August 21, 8:00 AM - 9:00 AM
We present the Code Documentation and Analysis Tool (CoDAT). CoDAT is a tool designed to maintain consistency between the various levels of code documentation, e.g. if a line in a code sketch is changed, the comment that documents the corresponding code is also changed. That is, comments are linked and updated so as to remain internally consistent and also consistent with the code.
By flagging "out of date" comments, CoDAT alerts the developer to maintain up-to-date documentation.
We use a large language model to check the semantic consistency between a fragment of code and the comments that describe it. Thus we also...
...read more...
Speaker(s)
Tracks:
This panel discussion, organized by the Small Business Innovation Committee, will explore the expanding role of emerging technologies within federal government operations and how small businesses can capitalize on these opportunities. The session will provide insights into the latest technological trends, the specific needs of federal agencies, and the pathways for small businesses to engage and innovate within this sector.
Objectives:
• To highlight the latest emerging technologies that are transforming federal government operations.
• To discuss the challenges and opportunities small businesses face in integrating these technologies into government projects.
• To provide practical advice on navigating federal procurement processes and leveraging government...
...read more...
Speaker(s)
Tracks:
Since its establishment just ten years ago, the U.S. Army’s Cyber and Electromagnetic Warfare School has seen unprecedented growth. Beginning with Officer training in 2015 followed by Warrant Officer training in 2016, culminating with Enlisted training in 2017, the School saw an over 500% increase in student through-put over the next five years. As the School continues to grow in size, it matures in its ability to use Live/Virtual/Constructive (L/V/C) capabilities.
In preparation for Fort Eisenhower’s Davis Range, the Cyber and Intelligence Centers of Excellent crafted and submitted an Electromagnetic Spectrum operations portion for the Army’s future Multi-Domain Operations Range Guide....
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 9:15 AM - 10:00 AM
Watch Recording...
Speaker(s)
Tracks:
Wednesday, August 21, 9:30 AM - 11:00 AM
Wednesday, August 21, 9:30 AM - 4:30 PM
Wednesday, August 21, 10:00 AM - 10:20 AM
Demonstrate an effective method for documenting code using hierarchically structured comments, so that code is easy to understand and debug....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center
The Capture the Flag (CTF) will be a jeopardy style event. This CTF will be an IN PERSON or Virtual event and open to all middle and high school students. Topics covered for this event will include Binary Exploitation, Reverse Engineering, Web Exploitation, Cryptography, Forensics, and Security.
Teams will be limited to FOUR members maximum. Teams with less than FOUR team members, can annotate “N/A” as the team member on the registration form.
Click here to register and for more information....
Tracks:
Wednesday, August 21, 10:10 AM - 10:30 AM
The U.S. Army's unified network demands a highly skilled workforce to manage its vast and complex infrastructure. However, traditional, labor-intensive approaches limit agility and scalability. We explore how next-generation technologies can revolutionize the Army's network operations by significantly reducing personnel needs.
We propose leveraging automation across key network functions:
Installation and Maintenance: Automating device setup and configuration minimizes manual effort for installation teams. Integration with advanced request and dispatch systems streamlines maintenance activities, reducing reliance on manual processes.
Real-Time Network Visibility and Proactive Management: Real-time data analysis can predict and prevent network issues, minimizing reactive troubleshooting and personnel workload. Automated workflows can trigger...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 10:15 AM - 11:00 AM
Watch Recording...
Speaker(s)
Tracks:
Wednesday, August 21, 10:15 AM - 11:15 AM
No situations are risk free!
Implementing risk management is a key to good decision-making and is essential for strong cybersecurity.
Due to dependence on information technology, leaders in most fields need to understand cybersecurity vulnerabilities and mitigation options. Join our panel of ROTC cadets as they share their opinions on application of theoretical lessons in cybersecurity to risk management challenges and opportunities they might face in the military.
Questions for the panelists will include:
What lessons, either academic or experiential, have been most helpful in forming your concept of cybersecurity risk management?
What do you think is the nation’s greatest cybersecurity threat?
Which concepts do you...
...read more...
Speaker(s)
Tracks:
In today's interconnected world, the proliferation of trojanized devices and malware presents a formidable threat to the integrity of military operations and national security. Our nation's national security leaders have warned that recent actions by Nation-states are intended to pre-stage sabotage attacks on U.S. national infrastructure. These infiltrations compromise not only sensitive information but also the critical systems and technologies on which our defense infrastructure relies. With devices and control systems unassumingly installed in military facilities, administrative offices, and even officials' personal devices, the potential for catastrophic breaches looms large. Current legislative requirements focused on supply chain assurance and the mapping...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 10:15 AM - 11:30 AM
The United States faces unprecedented national security and economic challenges. Strategic competitors seek to displace the U.S. military as the world’s preeminent force, the COVID-19 pandemic and impacts from climate change have exposed fragility in critical supply chains, and consolidation in the defense marketplace has undermined the competition and innovation needed to provide the best systems, technologies, services, and products to support the warfighter.
Attendees will learn the strategic objectives that will enable the Department of Defense (DoD or the Department) to expand and strengthen its relationship with small businesses and better leverage their capabilities to help solve the Department’s and...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 10:15 AM - 11:45 AM
- Room: Georgia Cyber Center Auditorium
The increasing prevalence of cyber threats highlight the critical need for the Department of Defense to have a capable and ready cyber workforce. The Department's approach features the implementation of a holistic talent management strategy codified in the DOD 8140 Cyber Workforce Qualification Program, featuring an agile and responsive framework that will drive innovation and development across the cyber workforce. Through the DoD 8140, the Department is expanding the qualification program from less than 9,000 positions to roughly 225,000 military, civilian, and contractor positions by establishing foundational and residential qualification criteria for each DoD Cyber Workforce Framework work role.
This presentation...
...read more...
Speaker(s)
Handout(s)
Wednesday, August 21, 10:30 AM - 10:50 AM
Develop a system that has the ability to simulate what would happen to a real-world building if cyber-attacks were launched against it. Implement different Arduino settings for each module of the building; a fully functioning elevator, an HVAC system, an alarm system, and an RFID scanner. Test the system so that all the modules are working properly and that the code is working with the modules in sync. Double check the system’s performance to ensure the safety and security each module is providing to the project....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 10:40 AM - 11:00 AM
In the landscape of the modern warfighter, data is a strategic asset. Data drives decisions and decisions drive outcomes. Access to data at the tactical edge for the warfighter and at the strategic level for decision-makers is imperative, and it is this integration of multi-domain operations that is essential for maintaining superiority in modern warfare, where the convergence of cyber and physical domains is increasingly critical. The Elastic Search AI Platform can ingest, store, and analyze petabyte-scale data from virtually any source, and is fully deployable in disrupted, disconnected, intermittent, and low-bandwidth (DDIL) environments. At the tactical edge, Elastic's real-time...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 11:00 AM - 11:20 AM
An experiment that tests how increasing dataset size and variability affects the output of a deepfake creation model, videos created by Artificial Intelligence for the final goal of improving deepfake detection models for cybersecurity purposes....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 11:00 AM - 1:00 PM
Wednesday, August 21, 11:10 AM - 11:30 AM
In today's ever-evolving digital landscape, the intersection of AI technologies and cybersecurity is paramount for ensuring robust data research and data resiliency. This session delves into the innovative utilization of AI to augment user data research and forensics capabilities while bolstering cyber defenses.
Key topics include:
• AI-Powered Data Research: Explore how AI technologies, utilizing Machine Learning (ML), Large Language Models (LLM), Neural Networks, and Deep Learning, are harnessed to enhance user data research processes. Understand the nuances of ML applications and the time considerations involved in training models.
• Cyber Resiliency Foundations: Discover the pivotal role of cyber resiliency, where protection, response,...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 11:30 AM - 11:50 AM
The rise of ransomware over the past few years is a major problem that has quickly become an extremely lucrative criminal business. We propose a blockchain solution based on 4 proxy servers and a control server which all record exactly the same transactions....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 11:30 AM - 12:30 PM
"Implementing Zero Trust Capabilities in Modern Architecture" is a 60-minute class designed to equip participants with the knowledge and skills required to implement Zero Trust security capabilities in today's network environments.
During this class, participants will explore the fundamental principles of Zero Trust and its significance in mitigating cyber risks. The class will emphasize the importance of identity and access management, micro-segmentation, and continuous monitoring as key components of a Zero Trust architecture.
Through practical examples, participants will gain insights into the core elements of implementing Zero Trust security. They will learn about the role of multifactor authentication, network segmentation, and encryption...
...read more...
Speaker(s)
Tracks:
Handout(s)
This discussion will be an update of the Army’s EW vision and the requirements development process for Army capability management of EW and spectrum management.
Listen to recording
...
Speaker(s)
Tracks:
Handout(s)
Data is critical to the decision-making process and mission success. Commanders depend on having the right data, at the right time, and with speed in order to make the right decisions, especially at the rapidly changing echelons of the Warfighter. Join these Warrant Officer experts as they discuss the innovations, challenges, and successes of collecting, analyzing, deciphering, communicating, and transmitting relevant data at Division and below.
Listen to recording...
Speaker(s)
Tracks:
Wednesday, August 21, 12:00 PM - 1:00 PM
Watch Recording...
Speaker(s)
Tracks:
Wednesday, August 21, 1:15 PM - 2:00 PM
Watch Recording...
Speaker(s)
Tracks:
Wednesday, August 21, 1:40 PM - 2:00 PM
The SpaceX pLEO constellation offers a significant advantage in military communication, providing agility, lethality, survivability and redundancy to current UTI communication. Starlink and Starshield's simplicity and rapid deployment capabilities will enhance Command Post's survivability and network capabilities. Embracing this technology will enhance the Army's ability to shoot, move, and communicate effectively, ensuring commanders have the latest and most relevant information on the battlefield....
Speaker(s)
Tracks:
Wednesday, August 21, 2:00 PM - 4:00 PM
For AFCEA TechNet Augusta 2024, join us for the next CompTIA Learning Solutions event. In keeping with this year's theme, industry leaders such as IBM and Elastic will join us to provide you with practical case studies about how leading organizations have transformed, accelerated, and aligned their daily cybersecurity operations to support the needs of soldiers and workers in various asymmetric environments. Join us to learn more about the unique and indispensable skills, technologies, and approaches needed to support today's exponential technologies, such as multi-modal AI, post-quantum encryption, and the "compute" necessary to support long-term cyber effects operations. We don't...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 2:10 PM - 2:30 PM
This research probes the potential of Generative Artificial Intelligence (GenAI) to tailor spear phishing attacks, examining both its capability to enhance attack strategies and to bolster defense mechanisms against such threats. Leveraging different LLM models, this study synthesizes insights from an array of recent studies to position GenAI as a dual-use technology in cybersecurity. This research probes the potential of Generative Artificial Intelligence (GenAI) to tailor spear phishing attacks, examining both its capability to enhance attack strategies and to bolster defense mechanisms against such threats. Leveraging different LLM models, this study synthesizes insights from an array of recent studies to...
...read more...
Speaker(s)
Tracks:
Handout(s)
The intent of this abstract is to help communicate the mission value of network packet analysis in optimizing limited SATCOM bandwidth and spend. This abstract highlights the following:
How the US Army can optimize existing bandwidth through network visibility
How the US Army can lower SATCOM costs by using network visibility to right size bandwidth
Listen to recording...
Speaker(s)
Tracks:
Wednesday, August 21, 2:15 PM - 3:00 PM
Session will include a 10 Year Celebration Speech, Recognition of Distinguished and Honorary Member of the Corps, and a Cake Cutting Ceremony.
Special Appointees
Honorary Officer of the Corps (HOoC)
COL(R) John D. Branch
Honorary Warrant Officer of the Corps (HWOoC)
CW5(R) Mark A. Mollenkopf
Honorary Sergeant Major of the Corps (HSGMoC)
CSM(R) James M. Krog
Distinguished Member of the Corps (DMoC)
COL(R) John D. Branch
CW5(R) Mark A. Mollenkopf
CW5(R) James Herubin
CW4(R) Laurimar Sammons
CW2(R) Frederick A. Robbins
CW2(R) William Flanagan
CSM(R) James M. Krog
MSG(R) Homer M. Minnick
Honorary Member of the Corps (HMoC)
GEN(R) Raymond T. Odierno
Mr. Liam Echlin
...
Speaker(s)
Tracks:
Wednesday, August 21, 2:15 PM - 3:15 PM
Watch Recording...
Speaker(s)
Tracks:
This panel discussion will explore the critical intersection of supply chain management and cybersecurity. With increasing digital interconnectivity, supply chains have become more complex and vulnerable to various cyber threats. This session aims to provide insights into the nature of these risks and the cutting-edge cybersecurity technologies that can help mitigate them.
Objectives
• Understand the evolving landscape of supply chain risks, particularly those related to cybersecurity.
• Identify key cybersecurity threats facing supply chains today.
• Discuss innovative cybersecurity technologies and strategies to protect supply chains.
• Share real-world examples and best practices from industry leaders.
• Encourage collaboration...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 2:15 PM - 3:30 PM
Small businesses are a vital feature of the economic fabric of the United States and have demonstrated remarkable resilience in the face of persistent challenges. Much of this resilience has been facilitated by local small business ecosystems in combination with federal resources. However, as economic conditions become more challenging and pressure builds on the federal budget, small businesses will undoubtedly face new hurdles.
The federal government as well as state and local governments have a key part to play in supporting industry and markets in their areas. One of the most important and beneficial ways they can help support industry and...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 2:40 PM - 3:00 PM
Acoustic side-channel attacks on keyboards can bypass security measures in many systems that use keyboards as one of the input devices. This research seeks to address these shortcomings by proposing an applicable method that takes into account the user's typing pattern in a realistic environment. Our method achieved an average success rate of 43% across all our case studies when considering real-world scenarios....
Speaker(s)
Tracks:
Handout(s)
Air superiority is critical in driving missions success for the U.S. Armed Forces through unrelenting force, as well as unparalleled intelligence gathering. The challenges faced with data gathering is how to effectively get the materials off the combat aircraft and processed in a timely manner.
In this session Dell will discuss how they developed a solution that provides edge processing of F-35 data (via the RAPIDS edge solution). The solution allows for data to be globally accessible by Crowd-Sourced Flight Data enterprise architecture, which is now being cloud enabled and enhanced for real-time streaming data analytics. Moreover, it’s a platform...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 3:15 PM - 4:15 PM
This session explores how to leverage the synergy between asset management and cybersecurity to create a robust cyber defense posture for the modern warfighter.
By understanding their critical roles – asset management providing a comprehensive view of deployed assets and cybersecurity safeguarding those assets – we can achieve unparalleled visibility and control across multi-domain environments. This integrated approach directly addresses DoD priorities like DFARS compliance, SBOM implementation, and efficient identification and mitigation of network vulnerabilities.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Wednesday, August 21, 3:30 PM - 4:30 PM
Enabling the Army to become data centric requires a culture shift in how the Army deploys cyber capabilities for its forces. Warfighters must have access to critical data for mission success, while deploying network technology across multiple classification levels, like UNCLASSIFIED/NIPRNet, SECRET/SIPRNet, or TOP-SECRET/JWICS, as well as utilizing large computing and storage capabilities to process data to provide to enable Department leaders. However, successfully operating with agility and within a contested cyber domain requires fully embracing the tenants of zero trust to access applications and data that have moved into the cloud from anywhere across the globe. Zero trust recognizes...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 3:30 PM - 4:45 PM
In the fast-paced realm of cybersecurity, inclusivity is not just a moral imperative but a strategic necessity. This panel delves into the transformative power of addressing the unique challenges within the community, and how aligning organizational values with inclusive practices, industry and government can accelerate innovation, bolster resilience, and enhance overall performance.
Our esteemed panel of industry leaders will explore the intersectionality of inclusion, technology, and security. Through insightful discussions and real-world examples, attendees will gain valuable insights into:
Navigating the complex landscape of government, military, industry, and academia surrounding the cybersecurity industry while promoting diversity and inclusion.
Strategies for recruiting, retaining, and...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 4:00 PM - 5:00 PM
Upskilling is a critical, yet overlooked, element of the ability to meet long-term, "pacing" challenges. What are organizations doing right now to align your learning needs to recent upskilling initiatives, including DoD 8140. In this part of the session, we will outline practical steps and provide case studies for organizations that have created upskilling pathways using resources that are available now. In this session, we will show you how to use the 8140 Marketplace, map your educational needs to the DCWF job roles, and use additional resources that are available to you....
Speaker(s)
Tracks:
Wednesday, August 21, 4:30 PM - 6:00 PM
...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 6:00 PM - 9:00 PM
- Room: Crowne Plaza, 1060 Center St, North Augusta SC
Tracks:
Thursday, August 22, 7:00 AM - 8:00 AM
- Room: Plaza Lobby/Riverwalk Hallway
Tracks:
Thursday, August 22, 7:00 AM - 1:00 PM
- Room: Olmstead Street Level Foyer
Tracks:
Thursday, August 22, 8:00 AM - 8:45 AM
As is evident in Ukraine and the Middle East, Decision Superiority is a key to success on the modern battlefield. Achieving and maintaining that superiority involves planning and execution processes that are innovative and evolving. During this session, BG Miles will leverage his experience of operating in the Pacific for the last two years as the INDOPACOM J6 to break down Decision Superiority into three simple components and frame it against the Pacing Challenge in the INDOPACIFIC AOR.
#1 Ability: A core tenet to assure Command and Control on the battlefield today remains good old fashioned communication planning – PACE plans. This...
...read more...
Speaker(s)
Tracks:
Thursday, August 22, 8:30 AM - 10:00 AM
Thursday, August 22, 8:30 AM - 1:00 PM
Thursday, August 22, 9:00 AM - 9:20 AM
As the Army makes the network its top priority to enable operations, Commanders must ensure that they are prepared and equipped to improve the readiness of their units. Today’s modern, leading edge Commander’s Intent-driven software-defined network will support the Army's ability to impose its will at the tactical edge.
A Commander's Intent-driven, hybrid cloud network architecture revolutionizes Army Cyberspace Operations by implementing advanced software-defined networking, analytics, automation, and orchestration—consistent with the DoD Zero Trust security framework. The Commander’s Intent-driven network is designed to provide a secure, agile, and resilient medium of maneuver for data and applications, thereby granting decisive operational advantages...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 9:00 AM - 10:00 AM
Thursday, August 22, 9:00 AM - 1:00 PM
0900 – 1030: Tour Exhibits
1030 – 1040: Welcome
1040 – 1050: Kahooti Icebreaker Challenge
1050 – 1130: Panel: “Decoding Your Future in Cyber”
1130 – 1200: Box Lunch
1200 – 1245: Jeopardy Challenge
1245 – 1255: Awards/Announcements
1255 – 1300: Closing Remarks...
Speaker(s)
Tracks:
Thursday, August 22, 9:30 AM - 9:50 AM
When it comes to AI & ML we all have grandiose ideas of what this future looks like, and we can all agree a future with more C-3PO, and less Agent Smith is ideal. Until reality catches up to science fiction we are bottlenecked by our compute capabilities. These limitations, coupled with data storage capacity, are compounded even more so at the tactical edge.
Splunk has been providing machine learning at the tactical edge since 2015 via our Machine Learning Toolkit (MLTK), and Data Science and Deep Learning (DSDL) since 2020. Deploying Splunk at the tactical edge allows users to leverage...
...read more...
Speaker(s)
Tracks:
Thursday, August 22, 9:30 AM - 11:30 AM
Today's networks are highly complex environments with borders that are constantly changing. In response to this highly complex environment, firewalls have become robust multi-functional devices that counter an array of threats to your network.
Participants who attend this workshop will learn how to:
Install a FortiGate device in a network
Configure basic routing
Create security policies
Apply security scanning
Configure local user authentication
Use the CLI
Configure the Fortinet Security Fabric
Session has been approved for (2) continuing education credits for certain ISC2, CertNext, GIAC, and CompTIA certifications. Please consult the CE flyer for details.
AFCEA will not provide attendance documentation....
Speaker(s)
Tracks:
Thursday, August 22, 10:00 AM - 10:20 AM
With today’s multi-domain data sharing requirements and cyber threat landscape, a data-centric layered defense approach utilizing a Zero Trust security architecture around critical data is key. According to Randy Resnick, director, Zero Trust Portfolio Management Office, Office of the DoD CIO, “It is a new way, it is the only way, that we can protect our data from adversaries going forward.” Providing Zero Trust data and network security in the field and with foreign partners in multi-domain environments can be challenging, both conceptually and practically. Finding zero trust accreditable and scalable solutions for the verification of data and assets that...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 10:15 AM - 11:30 AM
The Senior Enlisted Panel will delve into critical topics related to Joint Electromagnetic Spectrum Operations (JEMSO) and Cyber and Electromagnetic Activities (CEMA). During this hour-long panel, senior enlisted leaders will discuss enlisted perspectives, training, development, and operational excellence. The focus will be on the current and future battle space, emphasizing Joint Electromagnetic Warfare, Spectrum Operations, and Cyberspace Electromagnetic Activities. The panel aims to inform partners and peers at an unclassified level, fostering valuable insights and considerations.
Watch Recording...
Speaker(s)
Tracks:
Thursday, August 22, 10:30 AM - 10:50 AM
The joint multi-domain environment of today brings a new pace of information faster than ever before. This multidomain environment drives a complex data saturation that propels the need for data access capability in cloud resources at the edge. This data at the edge, though has potential for operational advantage, comes with new risk challenges to maintain speed of the mission. These data assets (such as AI/ML outcomes) when harnessed with zero standing privilege (ZSP) identity security brings the field operator the potential to mediate the risk of operating the edge data analytics while leveraging that data for competitive overmatch.
Key to...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 10:30 AM - 11:00 AM
Learn how ARCYBER is leveraging the US Army’s Transform in Contact initiatives to refine operational understanding and employment of radio frequency (RF) data requirements to enable effect generation and delivery on the battlefield. The ARCYBER RF Data Pilot will identify requirements to enable the transformation of US Army EW into the future of data sharing and rapid effects delivery....
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 11:00 AM - 11:20 AM
By utilizing Artificial Intelligence/Machine Learning (AI/ML) at the edge to perform real-time data processing and analysis, ML models can process vast amounts of data in real-time, filtering out the “noise”, providing commanders with actionable insights swiftly. This includes the identification of patterns, an ability to predict outcomes, and the optimization of resource allocation.
Edge devices can operate independently, maintaining functionality even when network connectivity is disrupted, ensuring continuous data processing. Through the use of Army developed ML decision models, edge devices can prioritize and send critical data when an opportunity arises, ensuring commanders receive the most pertinent information.
Red Hat Device Edge...
...read more...
Speaker(s)
Tracks:
Thursday, August 22, 11:00 AM - 1:00 PM
Thursday, August 22, 12:45 PM - 1:45 PM
Watch Recording...
Speaker(s)
Tracks:
Thursday, August 22, 2:00 PM - 6:00 PM
During this session, representatives from industry, academia, and the federal government are invited to participate in a detailed discussion with Cyber CDID Army Capability Developers about the problem statements and desired capabilities that will be included in the Cyber Quest 2025 Broad Agency Announcement (BAA). The intent is to assist industry and government stakeholders with refining their responses (whitepapers/quad charts) to the BAA. The BAA will be published on the beta.sam.gov website. Other key topics of discussion will include the technology selection process, timeline, industry participation requirements, etc....
Tracks: