TechNet Indo-Pacific 2019 Sponsorship Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages and Individual Sponsorships.

Select Criteria: Tracks = Continuing Education

Tuesday, November 19, 9:30 AM - 11:00 AM

  • Room: Nautilus Suite
Approved for 1 CompTIA CEU: A+, Network+, and Cloud+; 1 GIAC CPE; 1 CertNexus CEC In this session, we will explore DoD cloud and cybersecurity adoption within the DoD. This session will overview the DoD cloud service providers (CSPs), overview of considerations to adopt cloud, cybersecurity considerations, and practical examples of how the DoD agencies are adopting various models for digital modernization. We will walkthrough technical hands-on examples of important technical considerations for initial cloud standup, onboarding, and showcasing cybersecurity best-practices to secure cloud environments and modernize workloads and applications. AGENDA 1.Cloud Strategy DoD 2.Cloud Service Provider Overview 3.Overview of Modernization Strategy 4.Cyber Threat Landscape 5.Cyber Capabilities for... ...read more...
Speaker(s)
Speaker (confirmed)
Neil Kronimus
Senior Director, Cloud
General Dynamics Information Technology
Speaker (confirmed)
Dr. Matthew McFadden
Senior Director, Cyber
General Dynamics Information Technology
Tracks:

    Tuesday, November 19, 1:00 PM - 2:00 PM

    • Room: Honolulu Suite
    Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, CASP+ In 2017, the Deputy Secretary of Defense declared the intent to increase the speed of technological development and promote a culture of risk-taking and adaptation within the U.S. Department of Defense (DoD). Adoption of commercial cloud computing is a key enabler of this innovation. Real world use cases such as humanitarian assistance/disaster relief (HA/DR), multinational incident response, and episodic coalition events highlight how elastic, on-demand compute and storage resources can transform operations in a multipartner operational environment. Operating as a modern force in the Indo-Pacific region requires us to break... ...read more...
    Speaker(s)
    Speaker (confirmed)
    Sharon Woods
    Senior Executive Service, Director, Hosting and Compute Center
    Defense Information Systems Agency
    Tracks:

      Tuesday, November 19, 2:00 PM - 3:30 PM

      • Room: Nautilus Suite
      Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 1 GIAC CPE; 1 CertNexus CEC Cyber Security and compliance best practices in the cloud for DoD compliant workloads in accordance with the DoD Secure Cloud Computing Architecture (SCCA) and Security Requirements Guide (SRG).   Alignment to the NIST CSF in the cloud - The NIST Cybersecurity Framework (CSF) is recognized as the de facto guide for best practices in cybersecurity and risk-management for organizations of any size and in any sector or location. In this session, learn how to implement cloud services to align to the 108 outcome-based... ...read more...
      Speaker(s)
      Speaker (confirmed)
      Michael South
      Principal Security Business Director for the Americas
      Amazon Web Services
      Tracks:

        Tuesday, November 19, 3:45 PM - 4:45 PM

        • Room: Nautilus Suite
        Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, & CASP; 1 CertNexus CFR CEC; 1 GIAC CPE; ; 1 CertNexus CEC There exists a major loophole at the network endpoint from the wall to the desktop that cybersecurity does not address.  Physical security of network and terminal hardware and its user interface has been ignored in policy and practice enabling catastrophic breaches from insider threats, most notably Manning and Snowden. This session focuses on the need for convergence between physical security and cybersecurity to thwart emerging insider threats.  It reviews the background of information technology, existing policies, or lack thereof, and... ...read more...
        Speaker(s)
        Speaker (confirmed)
        Robert "Bob" Bauman
        President & Chief Executive Officer
        Trusted Systems, Inc.
        Tracks:
        Handout(s)

          Tuesday, November 19, 4:00 PM - 5:00 PM

          • Room: Tapa Ballroom 2-3
          Approved for 1 CompTIA CEU: A+, Network+ International standards create a common language which fosters a common understanding and reference point when discussing, implementing or testing a given technology, from cybersecurity to network interoperability. The Author will discuss the general engineering standardization process and then compare the methodologies used and processes of several standards bodies, with the goal of fostering coalition interoperability. Finally, the Author will describe the commitments in time and effort involved in creating a standard while helping the audience engage with the best-fit standards body....
          Speaker(s)
          Speaker (confirmed)
          Malcolm Airst
          Senior Technical Staff
          The MITRE Corporation
          Tracks:
            • Room: Honolulu Suite
            Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, & CASP; 1 GIAC CPE; 1 CertNexus CEC Global Cyber Strategies and Operations – From Cyber Defence to Cyber Resilience Estonia is a small country in the Baltics however it has been on the forefront of technology for many years.  Since the cyberattack in 2007 the importance of nation state cyber strategies and interoperability increased with many new initiatives starting from this post cyberwar event.  In the post 2007 cyberattack NATO setup the NATO Cooperative Cyber Defense Center of Excellence in 2008 with the HQ located in Tallinn. Estonia.  The Estonian... ...read more...
            Speaker(s)
            Speaker (confirmed)
            Joseph Carson
            Chief Security Scientist
            Thycotic
            Tracks:

              Wednesday, November 20, 9:30 AM - 11:00 AM

              • Room: Nautilus Suite
              Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 1 GIAC CPE; 1 CertNexus CEC This presentation will discuss challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User management and User Behavior Analytics are critical in protecting High Value Assets from nefarious actors - I have provided a brief excerpt from the presentation narrative below. Cybersecurity threats now come in many different forms - recent breaches of federal, state, local governments and commercial enterprises alike have proven this and many of them are the result of insider threats. Most modern Identity and Access Management... ...read more...
              Speaker(s)
              Speaker (confirmed)
              Frank J. Briguglio, CISSP
              Public Sector Identity Governance Strategist
              SailPoint
              Tracks:

                Wednesday, November 20, 10:30 AM - 11:30 AM

                • Room: Tapa Ballroom 2-3
                Approved for 1 CompTIA CEU: A+, Network+, Cloud+, PenTest+, CySA+, & CASP; 1 GIAC CPE; 1 CertNexus CEC The Coalition Interoperability Forum seeks to establish connectivity and information-sharing to better equip decision-makers and allies of the USG. AWS provides infrastructural support opportunities to achieve this interoperability mission.  Merritt will present an overview of AWS points of presence that form the AWS infrastructure backbone in the Pacific and globally. She will describe considerations around trust and security in cloud computing-- drawing upon her experience advising Fortune 100 companies globally on security in AWS. Merritt will share some use cases and examples of real-world applications... ...read more...
                Speaker(s)
                Speaker (confirmed)
                Merritt Baer
                Principal Engineer, Artificial Intelligence/Machine Learning
                Amazon Web Services
                Speaker (confirmed)
                Hayes Magnuson
                Senior Navy Account Executive
                Amazon Web Services
                Tracks:

                  Wednesday, November 20, 1:00 PM - 2:00 PM

                  • Room: Honolulu Suite
                  Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, CASP+; 1 GIAC CPE; 1 CertNexus CEC As a cybersecurity practitioner, Mari examines recent advancements in cloud security across the Federal sector including the DoD.  While the shared responsibility model continues to create cybersecurity coverage gaps, advances in vulnerability enumeration and threat-based analysis are improving the collective understanding.  As the trombone affect and cloud access bottlenecks are unraveled, Zero Trust solutions show promise but the DoD Secure Cloud Computing Architecture (SCCA) remains a solid model. As the DoD moves out on fit-for purpose cloud services, large cloud providers are... ...read more...
                  Speaker(s)
                  Speaker (confirmed)
                  Dr. Mari Spina
                  Principal Cyber Security Engineer
                  The MITRE Corporation
                  Tracks:

                    Wednesday, November 20, 2:00 PM - 3:00 PM

                    • Room: Tapa Ballroom 2-3
                    Approved for 1 CompTIA CEU: A+, Network+, Linux+, Cloud+, PenTest+, CySA+, & CASP Cloud platforms offer the Department of Defense a multitude of technologies with new features every month. Zero Trust Architectures and identity, credential, and access management enable better cybersecurity frameworks. Coalition networks have unique policy and security challenges. It is the system integrators' job to bring together the right technologies to build an effective solution that meets the needs of the system owners and end users and establishes trust amongst coalition partners....
                    Speaker(s)
                    Speaker (confirmed)
                    Brandon Lester
                    President
                    AFCEA Hawaii
                    Tracks:

                      Wednesday, November 20, 2:00 PM - 3:30 PM

                      • Room: Nautilus Suite
                      Approved for 1 GIAC CPE   Artificial Intelligence / Machine Learning is becoming the new normal for both commercial industry and the Department of Defense.  AI/ML services from the cloud are being adopted for every imaginable DoD and Industry use case.   Amazon Web Services will discuss the current state of AI/ML and the trends in the industry for best practices deploying these capabilities.   We will focus on: 1. Big Data best practices 2. AI/ML workflows and best practices 3. Managed API services for AI/ML 4. DoD use cases for AI/ML in the cloud  5. Securing an AI/ML Cloud Environment 6. Using AI/ML for Cyber Security and Best Practices Attendees will learn... ...read more...
                      Speaker(s)
                      Speaker (confirmed)
                      Merritt Baer
                      Principal Engineer, Artificial Intelligence/Machine Learning
                      Amazon Web Services
                      Tracks:

                        Wednesday, November 20, 3:00 PM - 4:15 PM

                        • Room: South Pacific Ballroom 2-4
                        Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE; 1 CertNexus CEC Our panel of senior women leaders will discuss the thrills and challenges of entering and succeeding in their chosen field, including evolving cybersecurity threats, vulnerabilities and solutions.  Discussion will center on Evolving cyber threats increasingly complex social engineering for hostile purposes attacks on critical infrastructure Enterprise vulnerabilities which enable malicious insiders to threaten assets including information which allow uninformed end-users to cause damage Promising solutions artificial intelligence for threat analysis and damage remediation increasing public awareness of security and privacy threats and vulnerabilities Each expert panelist will also... ...read more...
                        Speaker(s)
                        Moderator (confirmed)
                        Juliana Vida
                        Group Vice President and Chief Strategy Advisor
                        Splunk
                        Panelist (confirmed)
                        Jodi Ito
                        Information Security Officer
                        University of Hawaii
                        Panelist (confirmed)
                        Connie Lau
                        President & CEO
                        Hawaiian Electric Industries
                        Panelist (confirmed)
                        VADM Nancy A. Norton, USN
                        Director, Defense Information Systems Agency
                        Commander, Joint Force Headquarters - Department of Defense Information Network
                        Panelist (confirmed)
                        Ruth A. Youngs Lew, SES
                        Program Executive Officer for Enterprise Information Systems
                        Department of the Navy
                        Tracks:

                          Wednesday, November 20, 3:15 PM - 4:15 PM

                          • Room: Honolulu Suite
                          Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, & CASP The U.S. and its coalition partners work closely together in the field, but those efforts are hindered by an inability to communicate across disconnected collaboration environments separated due to security classification. Two programs managed by the U.S. Air Force Research Laboratory can help change this.  V2CDS is a first-of-its-kind, real-time voice and video cross domain solution to bridge between different security classified networks.  SecureView® is a cross domain access solution developed by the U.S. Air Force that provides users with the ability to access Multiple Independent Levels of... ...read more...
                          Speaker(s)
                          Speaker (confirmed)
                          Eileen Goodell
                          V2CDS Program Manager
                          Air Force Research Laboratory
                          Speaker (confirmed)
                          John Woodruff
                          SecureView Program Manager
                          Air Force Research Laboratory
                          Tracks:

                            Wednesday, November 20, 3:45 PM - 4:45 PM

                            • Room: Nautilus Suite
                            Recommended for Acquisition Training Training will provide an overview of GSA’s Governmentwide Acquisition Contracts (GWACs) that consist of Alliant 2, 8(a)STARSII and VETS2 vehicles and the IT Schedule 70 to assist you in determining the best solution for your IT requirements....
                            Speaker(s)
                            Speaker (confirmed)
                            Jennifer Jeans
                            Alliant 2 Contracting Officer Representative (COR), Federal Acquisition Service, Enterprise GWAC
                            U.S. General Services Administration
                            Speaker (confirmed)
                            Lyn Sankey
                            IT Account Manager for GSA IT Category Customer Engagement Division
                            U.S. General Services Administration
                            Tracks:
                            Handout(s)

                              Wednesday, November 20, 4:15 PM - 5:15 PM

                              • Room: Tapa Ballroom 2-3
                              Approved for 1 CompTIA CEU:  A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, CASP+; 1 GIAC CPE; 1 CertNexus CEC There is no single silver or platinum Identity, Credential, and Access Management (ICAM)  bullet for Coalition environments. Coalition environments represent a range of partnership options, differing degrees of mission integration, and  a range continuity timelines (episodic through continuous), and differing levels ICAM cohesion.   This session addresses Identity, Credential, and Access Management (ICAM) thoughts for next generation coalition environments based on lessons learned, projected trends and needs, and need for efficient and effective mission support....
                              Speaker(s)
                              Speaker (confirmed)
                              Ian Stewart
                              ICAM Technical Director
                              National Security Agency
                              Speaker (confirmed)
                              Roger Westman
                              Principal Cyber Engineer
                              MITRE
                              Tracks: