TechNet Augusta 2022 Sponsorship and Branding Opportunities

AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

The deadline to be included in sponsor signage is Wednesday, July 20th.


Jersey City,  NJ 
United States
  • Booth: T14

Cyber Fusion to enable Mission Success. Cyware helps cybersecurity teams build virtual cyber fusion centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response. Cyware is transforming security operations by delivering the industry's only Virtual Cyber Fusion Center Platform with next-generation SOAR and threat intelligence solutions for enterprise security teams, MSSPs, and agencies - reduce costs and analyst burnout while increasing efficiency.

 Press Releases

  • Cyware Enables All Industries to Benefit from CISA’s Automated Indicator Sharing (AIS) Threat Intelligence Exchange

    The inclusion of CISA AIS threat indicators in Cyware’s solutions will enable organizations across a large number of industries and government entities to engage in public-private cybersecurity collaboration.

    NEW YORK--(BUSINESS WIRE)--Cyware, the industry's leading provider of the technology platform to build Cyber Fusion Centers and threat intelligence sharing for ISACs and ISAOs, has been added to the group of commercial providers recognized by the Cybersecurity and Infrastructure Security Agency (CISA) for enabling access to their Automated Indicator Sharing (AIS) machine-readable information sharing capability.

    Members of threat information-sharing networks (ISACs/ISAOs) and enterprise security teams across a number of industry sectors, including financial services, healthcare, automotive, research & education, aviation, space, media & entertainment, and others that rely on Cyware’s threat intelligence sharing and automation solutions will now be able to benefit from the automated ingestion of CISA’s AIS threat intelligence directly into their security technologies through Cyware’s solutions. Furthermore, with Cyware’s inclusion on the CISA AIS vendor list, not only will Cyware customers be able to ingest the AIS data directly into their threat intelligence lifecycle, but they will also be able to share back threat intelligence with CISA. This bi-directional threat intelligence sharing with CISA will unlock the next level of private-public security collaboration at scale by helping improve the understanding of threat actor behavior, including their Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs).

    The AIS ecosystem allows private sector organizations, government agencies at the federal, state, local, tribal, and territorial levels, as well as information-sharing communities (ISACs/ISAOs), and other partners to share and receive cyber threat indicators and defensive measures at machine speed. Through its wide reach across the public and private sectors, AIS helps identify and mitigate pertinent cyber threats through real-time information sharing and provides assistance to help prevent, detect, and respond to incidents.

    Speaking on this occasion, Anuj Goel, CEO of Cyware said, “This initiative marks yet another milestone in Cyware’s journey toward building an automated threat intelligence sharing ecosystem. In addition to providing 20+ information-sharing communities (ISACs/ISAOs) with state-of-the-art threat intelligence-sharing solutions, Cyware has now taken one more step to bring organizations across a variety of industries and government entities onboard a growing threat intelligence sharing program in collaboration with CISA.”

    Organizations across different sectors can benefit from the shared knowledge, capabilities, and best practices learned through common threats and historical incidents faced by the broader community. Real-time threat intelligence sharing lays the groundwork for security collaboration to build proactive defenses against sophisticated cyber threats. Cyware not only connects industry-specific ISACs/ISAOs with their member organizations but also enables ISAC-to-ISAC intel sharing that takes cross-sectoral security collaboration to the next level. Now, with the addition of the AIS threat intel data, Cyware is facilitating the creation of an expansive security collaboration ecosystem spanning a large number of industries and governments to unlock opportunities for strengthening cyber resilience through two-way threat intelligence sharing.

    About Cyware

    Cyware helps enterprise cybersecurity teams build platform-agnostic cyber fusion centers by delivering cyber threat intelligence and next-generation SOAR (security orchestration, automation, and response) solutions. As a result, organizations can increase speed and accuracy while reducing costs and analyst burnout. Cyware's Cyber Fusion solutions make secure collaboration, information sharing, and enhanced threat visibility a reality for MSSPs, enterprises, government agencies, and sharing communities (ISAC/ISAO) of all sizes and needs.

  • The third-party audit performed by the globally acclaimed attestation and compliance services provider Schellman & Company verified the full compliance of Cyware’s security controls and business operations with trust services criteria relevant to Security under SOC 2 Type 2 requirements. 


    NEW YORK, NY – June 23, 2022 - Cyware, the industry’s leading provider of the technology platform to build Cyber Fusion Centers for enterprises and threat intelligence sharing for ISACs and ISAOs, announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria). The achievement highlights the company’s commitment to the highest levels of data security. 

    SOC 2 is a reporting framework created by the American Institute of Certified Public Accountants (AICPA) that sets benchmarks for Software-as-a-Service (SaaS) companies managing customer and user data based. The certification underscores that the internal systems and controls of the organization are in full compliance with the SOC 2 audit standards on a continuous basis. The audit for Cyware was carried out by Schellman & Company, the globally acclaimed attestation and compliance services provider.

    “Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we check all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013,” said Anuj Goel, CEO, Cyware.   

    Cyware brings together historically siloed security operations, allowing organizations to automate and share threat data more efficiently, and collaborate on threat response within their security functions as well as with other organizations within their network. 

    Cyware’s clientele includes large enterprises from critical infrastructure industries including some of the world’s largest financial and healthcare organizations, more than 20 sectoral information sharing communities (ISACs and ISAOs) that use Cyware’s solutions to share threat intelligence with over 10,000 member organizations, National CERTs, and Managed Security Service Providers (MSSPs/MDRs). Cyware also recently launched the industry’s first ISAC-to-ISAC Operational Collaboration initiative to eliminate barriers among cross-sectoral threat sharing. 

    The SOC 2 milestone confirms the company's ongoing commitment to earning and maintaining customer trust with security as the foundation for all its business operations and product development. 

    About Cyware

    Cyware helps enterprise cybersecurity teams build platform-agnostic cyber fusion centers. Cyware is transforming security operations by delivering the Cyber Fusion Center Platform, the next-generation SOC (NG-SOC), for its customers orchestrating the entire post-detection SecOps with automated SOC (ASOC) capabilities. As a result, organizations can increase speed and accuracy while reducing costs and analyst burnout. Cyware's Cyber Fusion solutions make secure collaboration, information sharing, and enhanced threat visibility a reality for enterprises, sharing communities (ISAC/ISAO), MSSPs, and government agencies of all sizes and needs.


  • Cyber Fusion to enable Mission Success
    Cyware’s Virtual Cyber Fusion Platform combines Next-Gen SOAR technology, Incident Response, Threat Intelligence, and Situational Awareness to deliver a security-driven digital transformation....

  • The modern security organization is designed to fight threats in real-time, proactively thwart incidents using intelligence, and generally ensure the digital integrity of the company while always being expected to do more. Yet, new technology often creates more alerts, derailing organizations from reacting to incidents promptly. At Cyware, we solve these challenges with our Virtual Cyber Fusion Platform:

    • Internal & External Collective Defense: Bridge silos between different security teams and functions within an organization to reduce overlapping eort, improve threat visibility and reporting, and create a collective defense.
    • End-to-End Threat Visibility: Cyber Fusion augments existing security tools and processes with a single pane of glass while connecting the dots to ensure teams have complete threat visibility.
    • Interoperability & Collaboration: Technology agnostic strategy that integrates with 250+ tools, including, but not limited to, EDRs, SIEMs, firewalls, and detection solutions. It brings machine-to-machine, machine-to-human, and human-to-human collaboration together through technology and processes.