About TechNet Cyber
Partnering to Win
Trust l Velocity l Agility
DoD has a critical mission to design, build, operate, and defend networks and digital systems to assure command and control and achieve information advantage in the era of competition. Today’s U.S. adversaries are proving increasingly persistent, capable, and agile. Improved trust, collaboration, and transparency between the government, commercial partners, and academia are key to enabling Joint All-Domain Command and Control (JADC2) and winning in cyberspace. The U.S. needs all partners working together to deny the adversary the advantage and to enable operations at the speed of trust. TechNet Cyber provides a forum to gather, collaborate, and develop trusted relationships.
TechNet Cyber Frequently Asked Questions
Who attends TechNet Cyber?
What is this year's theme?
When/where does TechNet Cyber take place?
Visiting the Exhibit Hall
Where is the exhibit hall located?
How much does it cost to attend?
Know Before You Go
Where do I pick up my badge?
Where can I park?
What is the recommended attire?
How can I receive a pre and post-show attendee list?
Who should I contact for accessibility assistance?
Photography/Videography/Audio Recording Policy
What are the public transportation options?
Are there any age restrictions in the exhibit hall?
Exhibit & Sponsor Information
How can I exhibit and/or sponsor?
What additional resources are available?
Prepare to be Aware
Conferences present opportunities for America's adversaries to target U.S. government employees, academia, defense industry and other personnel to collect our critical information. Be a hard target! Use good OPSEC practices to protect yourself and your organization's mission.
- Be aware of your surroundings when discussing sensitive unclassified critical information during the conference and after hours, in common/public areas (e.g. social gatherings, networking mixers, etc.).
- Be suspicious of strangers. Even though they sound like they belong at the conference, don't assume they are there for the same purpose as you.
- Use caution when sharing information with someone you don't know. Ask others to confirm a person's identity before sharing critical information about your organization's past, ongoing or future operations/activities/events. Protect your personal information, such as your room number and daily schedule. Don't give out your business cards freely, particularly when outside the United States. Remember, phishing is still the #1 adversary threat vector into your personal and government computers/devices/networks.
- If you use a laptop or other portable electronic device (personal or government-owned), use it cautiously. Disable the Bluetooth and WLAN/Wi-Fi connections when not in use, and if you use this type of connectivity, understand that you may expose personal and work-related critical information to an adversary. Be especially cautious when using unencrypted/unsecure WLAN/Wi-Fi hotspots.
BE SMART! BE SAFE! PRACTICE GOOD OPSEC!