TechNet Augusta 2022 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

The deadline to be included in sponsor signage is Wednesday, July 20th.

Thought Leadership


Booz Allen Hamilton - MR Walsh B

Integrated, Automated, and Intelligent Cyber Solutions

The cyber threat landscape continues to expand with increased connectivity between physical and digital systems. Today's cyber threats not only have the potential to compromise critical information and disrupt operations, but can also have life-threatening implications. As one of the world’s largest cybersecurity solution providers, Booz Allen has defended against some of the most advanced and persistent cyber threats. For more than four decades our elite cybersecurity teams have fought at the digital frontlines.

Click here to read more.

CACI - SPONSOR

Network Infrastructure

CACI delivers industry leading expertise and technology for network infrastructure design, implementation, and optimization of networks for  communications and IT sensor integration. Our networks enable quick, reliable, and secure transmission of mission‐critical data, including  communications and IT sensors on the same network. We enable secured state‐of‐the‐art communications around the globe and to the tactical edge.

Click here to read more.

Confluent - SPONSOR

Securing Data In Motion: Working at the Speed of the Mission

Everyday user experiences are being completely reimagined. Requesting a ride through an app is better than calling a cab. Buying online is changing the way we go shopping. And gone are the days of waiting in long lines at your local bank. Data within these modern businesses is in constant motion, flowing, in real-time, across systems, environments, and applications every time a user interacts with the system.

Click here to read more.

HII - Booth 621, SPONSOR

Automating Orchestration for Machine-Speed Cyber Defense

Military operations in the cyber and physical domains are often paralleled to provide a better understanding of the employment and effects of cyber capabilities. There are several similarities between the two domains, including the need for command and control (C2) of resources, situational awareness of the environment, and planning and preparation of the battlefield, to name a few. There are also substantial differences between them, two of which include our control of the domain and the inherent timescale within it.

Click here to read more.

HII - Booth 621, SPONSOR

Operationalizing a Zero Trust Architecture

The National Institute of Standards (NIST) first published the Risk Management Framework (RMF) in February of 2010 as a way to provide information security to operational systems. The US Government (USG) has since heavily relied upon the RMF and requires the application of the RMF to use a system operationally. While RMF has been modified and improved since its first publication, it still provides a basic or compliance-based set of criteria that improve the security posture of a mission critical system or application.

Click here to read more.

Leidos - ODS 42, SPONSOR

Enabling Continuous Modernization for Army Software Systems

Continuous Modernization is an Army-wide endeavor, requiring Army-wide coordination, to continually provide rapid delivery of enhanced capabilities to soldiers. The Army recognizes that industrial age, serial processes cannot keep up with ever-changing missions, operating systems, hardware, communications protocols, networks, message formats, cyber threats, vulnerabilities, data sources and formats.1 Therefore, the Army and the Joint Force must continue the shift from Industrial to Information Age approaches to modernization to accelerate the acquisition of mission software and systems.

Click here to read more.

Netskope - SPONSOR

Netskope for Zero Trust

Most security architectures in place across federal agencies today were engineered for a technology ecosystem that has significantly changed over the last two decades. And while the pandemic served as a forcing function, causing many federal organizations to come to terms with the shortcomings of their tooling, practices, and approach to security, one could argue that the limitations of legacy (i.e., vulnerable) technology solutions were just as debilitating over the last 20+ years as the pandemic was disruptive over the last 18+ months.

Click here to read more.

Northrop Gruman - MR HAMILTON A, SPONSOR

Why are Advanced Networking Technologies Important for the Department of Defense?

Click here to watch.

NTT Data - SPONSOR

Managing the IT Modernization Elephant

Technological advancements have developed beyond custom systems enabling commercially available enhanced tools globally for Airmen and Guardians to attain and quickly respond to mission imperatives in 2022, better than any time in history. The path to successful digital transformation for the Department of the Air Force (DAF) starts with the vision of what tools your Airmen/Guardians require and working with trusted vendors to deliver a consolidated service platform at scale and maintained through the full program lifecycle.

Click here to read more.