TechNet Cyber Supporting Partner Opportunities (Advertisements and Supporting Partner recognition does not imply federal endorsement.)
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2021 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!
Branding Opportunities Deadline: October 1st
Patron Package and Individual Opportunities Deadline: October 15th
Tuesday, October 26, 8:00 AM - 6:00 PM
- Room: Pratt Street Lobby West
Tracks:
Wednesday, October 27, 7:30 AM - 6:00 PM
- Room: Pratt Street Lobby West
Tracks:
Wednesday, October 27, 9:30 AM - 10:15 AM
Wednesday, October 27, 10:00 AM - 6:00 PM
- Room: Halls F, G, and Swing
Tracks:
Wednesday, October 27, 10:15 AM - 11:00 AM
- Room: Halls F, G and Swing
Tracks:
Wednesday, October 27, 10:30 AM - 11:30 AM
- Room: Swing Hall, 2700/2800 Aisle
The Defense Information Systems Agency(DISA Services Development (SD) Directorate DevSecOps Program is focused on the development of a Continuous Compliance Monitoring (CCM) approach for all DoD mission partners that monitors and provides compliance enforcement of containerized applications which cover all the DevSecOps pillars - Develop, Build, Test, Release and Deploy, and Runtime - for a secure posture with the focus being on automation and integration going forward. CCM is an automated process by which the DevSecOps team, including ISSMs and SCAs, can detect compliance issues and security threats during each phase of the DevSecOps pipeline. To date, the DevSecOps team...
...read more...
Speaker(s)
Tracks:
During this spotlight session, we will hear from our panelists on how the DoD365-J migrations are progressing, how DoD organizations can best utilize the DEOS contract for various support services such as interoperability between tenants and cross tenant collaboration, DoD Chief Information Office Initiatives, Classified Cloud Environment progress, and more....
Speaker(s)
Tracks:
Wednesday, October 27, 11:00 AM - 12:00 PM
Curious to discover things that drive the Office of Small Business Programs’ staff batty?! Can you effectively and excitedly convey what makes your company stand out among competitors? Are you always late for that very important date (proposal due date, meeting, or speaking engagement)? Can you recognize sloppy emails and know how to differentiate between “your” and “you’re”? Do you seek your own information or expect the Government to be your secretary? You won’t forget this humorous presentation—and it is guaranteed to give you more bang for your buck! ...
Speaker(s)
Tracks:
Wednesday, October 27, 12:00 PM - 1:15 PM
Wednesday, October 27, 1:15 PM - 2:00 PM
- Room: Halls F, G, and Swing
Tracks:
These sessions will be available on the TechNet Cyber website and in the mobile app.
GDIT Tech Talk: Innovation in Government: milCloud 2.0
Mr. Eric McGrane, Growth Leader, Defense Enterprise Services Sector
Jacobs Tech Talk: Threat Intelligence Insights
Mr. Charles Ramsey, Division Director – Insights
Lumen Tech Talk: Edge Computer Nodes
Mr. Andrew Dugan, Chief Technology Officer
AT&T Tech Talk: AT&T Cybersecurity – Security Operations Center
Forescout Tech Talk: Comply -to-Connect | The Basis for Cyber Security
IBM Tech Talk: IBM Think Gov Teaser
Juniper Tech Talk: Connected Security Evolved: The Threat-Aware Network for the Next Decade
ManageEngine Tech Talk: Bringing IT Together
Netscout Tech Talk: Leveraging Smart Data for Maximum Visibility
Peraton Tech Talk: SecureSense | Real-Time Spectrum Situational Awareness
Oracle Tech Talk: Strategic Data Management
Verizon Tech Talk: 5G...
...read more...
Wednesday, October 27, 1:15 PM - 2:15 PM
Join DISA and JFHQ-DODIN Senior Leaders, Program and Portfolio Managers for an informal outreach opportunity in the exhibit hall on opening day. This is your chance to begin conversations and connect with government leaders, program and portfolio representatives....
Wednesday, October 27, 1:45 PM - 2:15 PM
Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department’s complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and to lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met.
Join BeyondTrust to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.
Our cybersecurity...
...read more...
Speaker(s)
Tracks:
Wednesday, October 27, 1:45 PM - 4:30 PM
Speaker(s)
Tracks:
Handout(s)
Wednesday, October 27, 2:00 PM - 3:00 PM
- Room: Swing Hall, 2700/2800 Aisle
While the current defense-in-depth architecture has protected DoD data from adversaries in the past by placing various security products at multiple tiered locations, it has created silo’ed security architectures across NIPR and SIPR. The purpose of Thunderdome is to create a new zero trust security and network architecture that is dynamic, adaptable and can be extended from the user to the data edge. There are a lot of ways to describe zero trust, but there are three big, basic tenets of modern zero trust implementations: verify the user AND the device, make access and privileges conditional, and lastly, verify the data and applications explicitly. The bottom...
...read more...
Speaker(s)
Tracks:
Join us as DISA spectrum leaders detail DSO’s efforts to solve tomorrow’s spectrum challenges today.
The electromagnetic spectrum (EMS) transcends all warfighting domains and enables mission execution within each- it is a critical battlespace in its own right, where DoD must conduct fires, maneuver, and communicate to achieve dominance in the presence of ever-increasing military and civilian use.
Mr. Christopher Argo, Director for the Defense Spectrum Organization (DSO), provides remarks on why DSO, what DSO is doing to solve DoD challenges and examples of how DSO is addressing the challenges to enable EMS Superiority and Joint All Domain Command and Control (JADC2).
Mr....
...read more...
Speaker(s)
Tracks:
The AFCEA Cyber Committee launched its Zero Trust Strategies Subcommittee in October 2020 with the goal of promoting, encouraging, and facilitating Zero Trust adoption across defense and civilian missions. Join us as we discuss what the ZTS group has learned over the past year, initiatives launched, and the real-life challenges across agencies have encountered implementing the Zero Trust mindset....
Speaker(s)
Tracks:
Wednesday, October 27, 2:15 PM - 3:00 PM
Wednesday, October 27, 2:30 PM - 3:00 PM
Robotic Process Automation (RPA) is being used across government. Do you know what it is -- and what it's not? We'll share the myths and the truths of what RPA can do and we'll look at real examples of RPA solving practical problems. Together, we'll explore how the art of the possible is here today with Document Understanding, AI/ML Processes, Object Detection, Data Collection & Dissemination, Cybersecurity, Testing and other automations. We'll conclude with a summary of the benefits that RPA delivers to military operations both in garrison and deployed/disconnected operations. You'll come out of this discussion understanding it all...
...read more...
Speaker(s)
Tracks:
Wednesday, October 27, 3:00 PM - 3:30 PM
Wednesday, October 27, 3:15 PM - 3:45 PM
In the contested peer environment, speed, mobility, and cyber assurance are more critical than ever. This is particularly true in the joint coalition environment. To ensure future success, joint coalition interoperability needs data-management-as-a-service to leverage a substantial data plane for rapid access to assets in information warfare. When enabled for this capability, identity-focused cyber assurances across the security domains enable all joint coalition partners to operate at full speed to access data for the mission while minimizing risks by using least privilege and secure identity controls to attribute data.
A cloud-enabled data-management-as-a-service solution addresses unique sets of challenges to support the...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, October 27, 3:30 PM - 4:30 PM
Wednesday, October 27, 3:45 PM - 4:30 PM
Wednesday, October 27, 4:00 PM - 4:30 PM
Lumen’s Black Lotus Labs detected a new remote access trojan we’re calling ReverseRat. Based on our global telemetry and analysis, we identified that the actor is targeting government and energy organizations in the South and Central Asia regions with operational infrastructure hosted in Pakistan. ReverseRat was deployed in parallel with an open-source RAT called AllaKore to infect machines and achieve persistence. Given the critical nature of the sectors the actor is targeting, we advise security practitioners to learn the actor’s current tactics, tools and procedures to better defend their organizations against potential attacks.
The ReverseRat infection chain is noteworthy because of...
...read more...
Speaker(s)
Tracks:
Wednesday, October 27, 4:30 PM - 6:00 PM
- Room: Halls F, G, and Swing
Tracks:
Thursday, October 28, 7:30 AM - 5:00 PM
- Room: Pratt Street Lobby West
Tracks:
Thursday, October 28, 8:00 AM - 10:30 AM
- Room: Halls F, G, and Swing
Tracks:
Thursday, October 28, 8:00 AM - 4:00 PM
- Room: Halls F, G and Swing
Tracks:
Thursday, October 28, 8:15 AM - 8:45 AM
The MARS Suite©, currently on the Department of Defense Information Network (DoDIN) Approved Products List (APL) – tracking number 1832002), correlates cyber threat and vulnerability data to asset criticality, mission risks, and other operational data to achieve an Enterprise-wide Common Operating Picture – and enable holistic situational awareness to quickly identify and manage risk in an ever- changing network environment. The MARS Suite© solution focuses on enabling this correlation, and advances network monitoring capabilities by moving beyond point solutions to manage to a uniform risk profile. The resulting cyber common operating picture provides leadership and hands-on practitioners with the ability...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 8:15 AM - 9:15 AM
- Room: Swing Hall, 2700/2800 Aisle
DoD Cloud Infrastructure as Code (IaC) accelerates cloud infrastructure deployment timelines from months to potentially hours, enabling teams to focus on what’s important - their mission. Accelerated cloud deployment is achieved through pre-configured, pre-authorized cloud baselines that leverage Platform as a Service (PaaS) directly from the Cloud Service Providers. These baselines are readily available to end users looking to move their organizations’ data and applications to the cloud.
The DoD Cloud IaC Product Owner, will discuss how organizations can leverage cloud baselines to expedite cloud deployments, DoD Cloud IaC achievements to date, and share real world examples of IaC including the...
...read more...
Speaker(s)
Tracks:
JADC2 efforts are from across DoD and are driven by Joint Staff J6. It is a coalition of DoD Commands, Services, and Agencies (C/S/A) working to meet strategic and tactical needs for future military competition, crisis, and combat. Everything about how we architect, operate, and defend our systems and networks is changing to address JADC2 goals.
DISA has many initiatives supporting JADC2, and the panel will discuss these. Four are infrastructure and software delivery initiatives: Zero Trust; Identity, Credential, and Access Management (ICAM); infrastructure / technology refreshes and cloud computing; and DevSecOps, Compliance as Code, and Continuous ATO capabilities. Three new...
...read more...
Speaker(s)
Tracks:
The government is changing what technology it procures and how. This panel will focus on the intersection of technology and contracting to drive technology modernization. Learn about how these trends are impacting the defense sector and what it means for industry....
Speaker(s)
Tracks:
Thursday, October 28, 8:15 AM - 3:30 PM
Speaker(s)
Tracks:
Handout(s)
Thursday, October 28, 8:30 AM - 9:15 AM
Thursday, October 28, 9:00 AM - 9:30 AM
Zero Trust is the hot new buzz word - but what does it mean and how can you actually implement it across your federal organization effectively? Being completely cut off is the only way to achieve 100% trust, but such a "Cone of Silence" approach didn't work for Agent Smart and it won't work for your federal agency if you need to collaborate with others.
In reality, every action does not require the same level of scrutiny or protection. Browsing LinkedIn, for example, should not carry the same level of protection as uploading a file. At Netskope, we believe that context...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, October 28, 9:30 AM - 10:15 AM
Thursday, October 28, 9:45 AM - 10:15 AM
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. Quantum computers can launch attacks that break asymmetric cryptography, rendering the entire PKI-based encryption method obsolete. In fact, the National Institute of Standards and Technology (NIST) is researching way to deal with the effects of quantum power. As quantum technology advances, agencies will be forced to protect their information and communications against cryptographic attacks through quantum resistant technology.
Attend this session to learn how to stay one-step ahead of the quantum risk by deploying future-proof encryption technology to...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, October 28, 10:30 AM - 11:00 AM
HYCU is the fastest-growing leader in the data management and mobility as a service industry. By bringing true SaaS-based data backup to both on-premises and cloud-native environments, mission partners are provided unparalleled data protection, migration, management and disaster recovery. HYCU’s award-winning, purpose-built solutions eliminate the complexity, risk and high cost of legacy-based solutions, providing data protection simplicity in a hyper-connected, multi-cloud world. Customers experience frictionless, cost-effective data backup and recovery, no matter where their data resides.
HYCU Protégé provides application aware data management, data mobility and disaster recovery across multiple clouds to ensure mission partner data can be protected, available and...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 10:30 AM - 11:30 AM
You’ve heard about companies that grow from small to large and you’ve wondered how they did it. You don’t have to wonder anymore. This panel discusses how these companies did it with each taking a different path to grow. They may share their biggest failures, tips and tricks, how they handled “no” and what were their biggest keys to their success. Come ready to ask your questions! ...
Speaker(s)
Tracks:
- Room: Swing Hall, 2700/2800 Aisle
Speaker(s)
Tracks:
Operationalizing Cyberspace: DODIN Area of Operation and Area of Operation Approving Officials” will offer brief historical context of the Clinger Cohen and Goldwater Nichols Act dichotomies as well as delve into how the Department can implement a comprehensive, integrated threat approach to cybersecurity. Key aspects of the discussion will bridge the technical and operational conditions necessary to achieve this goal.
...
Speaker(s)
Tracks:
Thursday, October 28, 11:15 AM - 11:45 AM
During the COVID-19 Pandemic, a large part of the Federal work force was required to work at home. Users needing access to classified networks needed a rapidly deployable, scalable solution. Traditional solutions consisting of Type 1 encryption are expensive, difficult to manage, and require costly certifications to manage, maintain, and upgrade. As an alternative, PacStar Enterprise CSfC Solutions (ECS) provide gateway services for classified networks using COTS products to meet the security and configuration requirements of the National Security Agency (NSA) Commercial Solutions for Classified (CSfC) program. It enables DoD and Federal organizations to transmit classified information using commercial encryption...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 12:00 PM - 1:15 PM
Thursday, October 28, 1:15 PM - 2:00 PM
- Room: Halls F, G, and Swing
Tracks:
These sessions will be available on the TechNet Cyber website and in the mobile app.
GDIT Tech Talk: Innovation in Government: milCloud 2.0
Mr. Eric McGrane, Growth Leader, Defense Enterprise Services Sector
Jacobs Tech Talk: Threat Intelligence Insights
Mr. Charles Ramsey, Division Director – Insights
Lumen Tech Talk: Edge Computer Nodes
Mr. Andrew Dugan, Chief Technology Officer
AT&T Tech Talk: AT&T Cybersecurity – Security Operations Center
Forescout Tech Talk: Comply -to-Connect | The Basis for Cyber Security
IBM Tech Talk: IBM Think Gov Teaser
Juniper Tech Talk: Connected Security Evolved: The Threat-Aware Network for the Next Decade
ManageEngine Tech Talk: Bringing IT Together
Netscout Tech Talk: Leveraging Smart Data for Maximum Visibility
Peraton Tech Talk: SecureSense | Real-Time Spectrum Situational Awareness
Oracle Tech Talk: Strategic Data Management
Verizon Tech Talk: 5G...
...read more...
Thursday, October 28, 1:30 PM - 2:00 PM
Challenge: Data protected by Rivest-Shamir-Adleman (RSA), Diffie-Hellman and other asymmetric encryption algorithms/methods are at risk from emerging quantum computers. Those methods are current techniques of key agreement procedures also known as key exchange protocols, regardless of Layer-1 encryption, MACsec, IPsec or TLS.
• Emergence of quantum computers with ultra-high processing power poses a significant threat to established methods of securing communications networks by breaking the asymmetric crypto algorithms
• Attackers today can read and store the dataflow including the key exchange, waiting until the quantum computer exists and decrypt stored data
• Enterprises need to begin security measures now
Solution: Develop an optical transport...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 1:30 PM - 4:30 PM
***Separate (no-cost) registration required for virtual attendees. Click here to register.***
If you’re a career changer or are seeking new hands-on, technical skills related to Cloud+ and PenTest+ join us for this comprehensive, no-cost sneak peek into two of the most in-demand job roles. Attendees will understand the skills needed to be successful and walk away with valuable insight in a fraction of the time you might spend in a traditional bootcamp.
This 3-hour bootcamp will cover:
Critical cloud-based supply chain issues facing us in the cloud
How the attack surface has, and hasn’t, changed in the cloud
Unique, professional-level pen testing skills for cloud...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 2:00 PM - 2:45 PM
Thursday, October 28, 2:00 PM - 3:00 PM
The Department of Defense continues its transformational effort to integrate people, processes and technology under a Command-centric Operational Framework for Cyber. This session “Full Spectrum Cyberspace Operations - Operational Command Framework” will take you through the complexity and scope of responsibility inherent in the framework’s implementation, how partnerships enhance its success, and ultimately how it sets the conditions for seamless simultaneous operations throughout DODIN’s steady-state of continuous competition, and contingency and crisis situations....
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU for: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, CASP+, 1 GIAC CPE, and 1 CertNexus CEC for CyberSec First Responder (CFR) and Certified Internet of Things Practitioner (CIoTP)
AI/ML is becoming the norm for - and the new battleground between - bad actors and the good guys. Opportunities in both warfare and business are on the table. On this panel, cybersecurity leaders will discuss how government and industry are quickly adopting artificial intelligence and machine learning.
Topics will include:
Identifying key opportunities, threats, and challenges with AI/MI
Implementing AI/MI while maintaining good cyber hygiene to defend against rapidly evolving...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 2:15 PM - 2:45 PM
“You can’t hit what you can’t see!” - Walter Johnson, Washington Senator’s Pitcher
TCP/IP is inherently insecure. Instead of digging a bigger moat (IDS, IPS, Firewalls, etc) we hide the connections and network infrastructure from untrusted parties, so you can focus on OPERATIONS and better utilize your people, time, and money.
OVERVIEW
The IMPRES Cyberspace Operations Infrastructure (CSOI) is a solution framework that enables Zero Trust Architectures (ZTA) by harnessing the power of Software Defined Perimeter principles with enhanced Identity governance approaches. CSOI employs micro, macro, and cross-boundary segmentation, including end-to-end encryption, and automatically authenticates, authorizes, and connects (on-demand) secure tunnels using unique...
...read more...
Speaker(s)
Tracks:
Thursday, October 28, 3:00 PM - 3:30 PM
To perform in the modern technological environment, organizations must be not only technology-enabled, but data-driven and data-centric. Government agencies and organizations, like large commercial firms, struggle with data management issues at scale. Robust data is required for organizations to take full advantage of advanced analytics, such as machine learning. Robust data means comprehensive, complete, and accurate data that can be readily shared from process to process. Enterprise-scale, cloud-based DMaaS platforms address these challenges and provide an optimized solution to manage data by eliminating layers of data infrastructure and duplicative, competing data environments.
Defense and Intelligence Community agencies, organizations, and units have...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, October 28, 3:00 PM - 4:00 PM
During this panel leaders in industry will share their experiences in driving velocity in their organizations.
The panel will examine how industry has adapted to move with velocity of action and how government can partner with them to drive commercial solutions for the warfighter....
Speaker(s)
Tracks:
Thursday, October 28, 4:00 PM - 5:00 PM
Discussion Topics:
Robotic Process Automation
Leveraging Data
...
Tracks:
Friday, October 29, 7:00 AM - 12:00 PM
Friday, October 29, 8:00 AM - 8:15 AM
Friday, October 29, 8:15 AM - 9:15 AM
Friday, October 29, 9:15 AM - 9:30 AM
Friday, October 29, 9:30 AM - 9:45 AM
Friday, October 29, 9:30 AM - 3:00 PM
Friday, October 29, 9:45 AM - 10:00 AM
Friday, October 29, 10:00 AM - 10:10 AM
Friday, October 29, 10:10 AM - 10:25 AM
Friday, October 29, 10:25 AM - 10:40 AM
Friday, October 29, 10:40 AM - 11:15 AM
Friday, October 29, 11:15 AM - 12:15 PM
Friday, October 29, 12:15 PM - 1:35 PM
Digital Capabilities and Security Center Briefer: Jason Martin
Cyber Security and Analytics Directorate Briefer: Dr. Brian Hermann
Joint Enterprise Service Directorate Briefer: Caroline Bean
...
Friday, October 29, 1:35 PM - 1:50 PM
Friday, October 29, 1:50 PM - 2:05 PM
Friday, October 29, 2:05 PM - 2:25 PM
Friday, October 29, 2:25 PM - 3:00 PM