TechNet Indo-Pacific 2022 Supporting Partner Opportunities

AFCEA has developed an enhanced suppprogram that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Opportunities, and Branding Opportunities.

Have an idea for a Supporting Partner Opportunity not listed below? We are here to ensure you have the best conference experience. We are happy to create a custom package to meet your specific needs. Let us know your vision, objective and budget and we’ll create a customized opportunity just for you.

The deadline to submit contracts and sponsor artwork is Friday, October 7th.

Panel #2: Industry: What is Needed to Ensure Zero Trust at the Operational & Warfighting Environments?

  • Room: South Pacific Ballroom (Mid-Pacific Conf Center)
Wednesday, November 02, 2022: 9:45 AM - 11:00 AM


Moderator (confirmed)
LTG Susan S. Lawrence, USA (Ret.)
President & Chief Executive Officer
AFCEA International
Panelist (confirmed)
MG Peter A. Gallagher, USA (Ret.)
Senior Vice President for Technology and Solutions
Panelist (confirmed)
Cuong Nguyen
Vice President, Public Sector
Aerospike, Inc.
Panelist (confirmed)
Patrick Perry
Senior Director of Federal Strategy
Zscaler U.S. Government Solutions
Panelist (confirmed)
Imran Umar
Chief Engineer
Booz | Allen | Hamilton



  • How DDIL environments can drive zero trust architectures, particularly by distributing data (and controls/access) to combat edge (consider oconus cloud and gateways as much as ICAM)
  • Joint and coalition factors affecting zero trust technology or architecture choices, considering multiple service SIPR enclaves or CENTRIXS.
  • Scaling zero trust from small edge kits to main operating bases
  • Complexity of the zero trust environment in operational context, including how to implement effective structures to speed data access as needed (management functions, training, reach back, etc)