TechNet Indo-Pacific 2022 Supporting Partner Opportunities


AFCEA has developed an enhanced suppprogram that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Opportunities, and Branding Opportunities.

Have an idea for a Supporting Partner Opportunity not listed below? We are here to ensure you have the best conference experience. We are happy to create a custom package to meet your specific needs. Let us know your vision, objective and budget and we’ll create a customized opportunity just for you.

The deadline to submit contracts and sponsor artwork is Friday, October 7th.

Breakout Session: Building Trust with ICAM

  • Room: Tapa I Theater
Tuesday, November 01, 2022: 1:30 PM - 2:30 PM

Speaker(s)

Speaker (confirmed)
John Sahlin
Director of Cyber Solutions, Defense Division
General Dynamics Information Technology
Speaker (confirmed)
Chuck White
Founder
Fornetix

Description

Building Zero Trust Architectures start with determining Identity, and, from there, building trust with authentication and authorization.

Coalition Interoperability also starts with identification, authentication, and authorization. Considering the United States conducts operations with Joint and Coalition partners, the ability to securely communicate is based on the same principles.

Team GDIT’s solution built for the DISA’s Enterprise ICAM capability is a baseline that can help build trust in Coalition environments. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for Zero Trust, network micro segmentation, data protection, and Secure Access Services Edge. This identity-based approach allows information sharing to be established faster with more security. The tools for Federation in the prescribed ICAM solution also enables operations in Denied, Disrupted Intermittent Limited communication (DDIL) environments.

Ultimately, when boundaries are defined by data, the protections on the data become bound to ICAM.