TechNet Augusta 2022 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

The deadline to be included in sponsor signage is Wednesday, July 20th.

Solution Review: Centralized Identity Driven Zero Trust

  • Room: Innovation Theater
Tuesday, August 16, 2022: 12:00 PM - 12:20 PM

Speaker(s)

Speaker (confirmed)
Josh Brodbent
RVP, Public Sector Solutions Engineering
BeyondTrust

Description

Zero trust is about knowing who is doing what within your network and ensuring that in the event of anomalous activity, you can control and limit threats to the network. Applying the granularity of Privileged Access Management (PAM) to achieve zero trust objectives ensures all access is appropriate, managed, and documented, regardless of how the perimeter has been redefined. To stay agile, agencies must leverage Zero Trust principals to never trust, always verify, and only allow access when contextual parameters are met. Leveraging PAM and robust identity security strategies enables agencies to move from a network-based approach to a data centric approach to defending systems.

Join this session and understand:

  • Why Privileged Access Management (PAM) is essential to mission critical DoD initiatives
  • How to enable IT teams with a centralized management, reporting, and analytics console that provides unmatched visibility and control over privileged access activity
  • Perspective on data centric security to defend agency systems and the path to secure modernization using Least Privilege


Tracks: