TechNet Augusta 2024 Supporting Partner Opportunities


AFCEA has developed an enhanced supporting partner program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories such as Patron Packages, Branding and Individual Opportunities.

Deadline to purchase a Supporting Partnership is July 10th.

AFCEA Greater Augusta Chapter Course: Beans, Bullets, and Bytes: Realizing the Promise of Zero Trust

  • Room: Estes A
Wednesday, August 21, 2024: 3:30 PM - 4:30 PM

Speaker(s)

Speaker (confirmed)
Ryan McArthur
Chief Technology Officer, Public Sector, Federal
Zscaler

Description

Enabling the Army to become data centric requires a culture shift in how the Army deploys cyber capabilities for its forces. Warfighters must have access to critical data for mission success, while deploying network technology across multiple classification levels, like UNCLASSIFIED/NIPRNet, SECRET/SIPRNet, or TOP-SECRET/JWICS, as well as utilizing large computing and storage capabilities to process data to provide to enable Department leaders. However, successfully operating with agility and within a contested cyber domain requires fully embracing the tenants of zero trust to access applications and data that have moved into the cloud from anywhere across the globe. Zero trust recognizes the shortcomings of network security and instead builds security into the connection through policy decision making and policy enforcement. The correct policy can determine whether a user at an endpoint has the appropriate access permissions, to include security classification of a user, to login to a military application to view or manipulate data. Within the zero trust framework, a critical component is to deliver a secure and protected connection between each end and this is completely independent of the underlying network infrastructure. Fully embracing zero trust, and its focus on securing data, not networks for a data centric Army clears the way to think of a network as just a means of transport, reversing decades of designing, developing, implementing, and operating secure networks at multiple classification levels. The culture shift from network-centricity to data-centricity enables an agile Army to fully integrate ubiquitous public network access with cloud services, and thanks to zero trust that data is secured for mission success. 

 


Tracks:


Handouts



Click here for Continuing Education approvals