At MILCOM, global military communications professionals face command, control, communications, computing, intelligence, surveillance and reconnaissance (C4ISR) challenges head on. They look at them from every angle and discuss them from end to end – research and development through future needs. The conference allows industry the opportunity to hear and understand the requirements, pace of change and state of play in a variety of C4ISR markets serving the military, federal agencies and multinational entities.
Join military and industry communications professionals in this evolving conversation November 12-14, 2019, Norfolk, VA. MILCOM features outstanding technical presentations, discussions and tutorials, as well as a nearly 30,000 square foot exhibit hall. Experts in C4I and cyber issues as well as science and technology developments will lead more than 200 unclassified and restricted sessions.
MILCOM Frequently Asked Questions
Who attends MILCOM?
When/where does MILCOM take place?
Visiting the Exhibit Hall
Where is the exhibit hall located?
Registration and Program Questions
How much does it cost to attend?
Where can I find the Conference Agenda?
How do I register?
Additional Featured Programming
Know Before You Go
Where do I pick up my badge?
Where can I park?
What is the dress code?
How can I receive a pre and post-show attendee list?
Who should I contact for accessibility assistance?
Photography/Videography/Audio Recording Policy
What are the public transportation options?
Are there any age restrictions to get into the exhibit hall?
Exhibit & Sponsor Information
How can I exhibit and/or sponsor?
What additional resources are available?
Prepare to be Aware
Conferences present opportunities for America's adversaries to target U.S. government employees, academia, defense industry and other personnel to collect our critical information. Be a hard target! Use good OPSEC practices to protect yourself and your organization's mission.
- Be aware of your surroundings when discussing sensitive unclassified critical information during the conference and after hours, in common/public areas (e.g. social gatherings, networking mixers, etc.).
- Be suspicious of strangers. Even though they sound like they belong at the conference, don't assume they are there for the same purpose as you.
- Use caution when sharing information with someone you don't know. Ask others to confirm a person's identity before sharing critical information about your organization's past, ongoing or future operations/activities/events. Protect your personal information, such as your room number and daily schedule. Don't give out your business cards freely, particularly when outside the United States. Remember, phishing is still the #1 adversary threat vector into your personal and government computers/devices/networks.
- If you use a laptop or other portable electronic device (personal or government-owned), use it cautiously. Disable the Bluetooth and WLAN/Wi-Fi connections when not in use, and if you use this type of connectivity, understand that you may expose personal and work-related critical information to an adversary. Be especially cautious when using unencrypted/unsecure WLAN/Wi-Fi hotspots.
BE SMART! BE SAFE! PRACTICE GOOD OPSEC!