TechNet Indo-Pacific Supporting Partner Opportunities


AFCEA has developed an enhanced Supporting Partner program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages and Individual Opportunities.

The deadline for Sponsorship Opportunities is March 11th.

Zero Trust Architecture from Sensor to Shooter

  • Room: Tapa Ballroom I (Tapa Conf Center 2nd Floor)
Wednesday, April 13, 2022: 2:00 PM - 3:30 PM

Speaker(s)

Speaker (confirmed)
Chuck White
Chief Technology Officer
Fornetix

Description

Approved for 1 CompTIA CEU for: A+, Network+, Security+, Cloud+, Linux+; 1  GIAC CPE

Objective: Develop an understanding of how Zero Trust Architecture is applied in Information Technology, Operational Technology, and Mission Networks.

 Introduction Scenario- Table Top Exercise

-Sensor to shooter in a Coalition network.

o Drone platform through Coalition network to INDOPACOM infrastructure down to

Services

o Intent is to have the group discuss possible pitfalls in C5ISR when facing a

sophisticated adversary.

What is Zero Trust?:

- NIST SP800-207 Definition and Terms

  o General Architecture, Identification, Authentication, Authorization, Audit

  o Policy Decision Points

  o Policy Enforcement Points

  o Policy Information Points

Identity Centric and Data-Centric methodologies

Applying Zero Trust

- IT Systems - assertion, measurement, authorization, audit

o Work through a simple implementation of a Zero Trust Architecture for

Coalition Sharing

- Operational Technology(OT)/Mission Systems

  o Quick primer on OT

        What is OT?, Why is it Important?

  o Review on OT and Mission systems being very similar

o Work through a simple OT ZTA for Secure Mobile Devices on a Coalition

Network

Zero Trust Principles Applied in IT/OT/Mission

- Takes advantage of the continuum of IT to Mission (read OT)

- Continuous Validation and information move from the edge into more

consolidated computer environments.

- Ultimate enabler of secure sensor to shooter paradigm.

Beginning Scenario - now with Zero Trust Architecture applied

- Table top exercise: Apply Lessons learned on Zero Trust Architecture to an

introductory scenario

- If the session was beneficial the participants should be able to consider

where to employ Policy Decision Points\Policy Enforcement Points across

Mission/OT/IT Networks to employ Zero Trust Architecture principles against

the adversary scenarios defined at the beginning of the session.


Tracks:


Sponsored by:

Approved for 1 CompTIA CEU for: A+, Network+, Security+, Cloud+, Linux+; 1 GIAC CPE