TechNet Indo-Pacific Supporting Partner Opportunities
AFCEA has developed an enhanced Supporting Partner program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages and Individual Opportunities.
The deadline for Sponsorship Opportunities is March 11th.
Zero Trust Architecture from Sensor to Shooter
- Room: Tapa Ballroom I (Tapa Conf Center 2nd Floor)
Wednesday, April 13, 2022: 2:00 PM - 3:30 PM
Speaker(s)
Description
Approved for 1 CompTIA CEU for: A+, Network+, Security+, Cloud+, Linux+; 1 GIAC CPE
Objective: Develop an understanding of how Zero Trust Architecture is applied in Information Technology, Operational Technology, and Mission Networks.
Introduction Scenario- Table Top Exercise
-Sensor to shooter in a Coalition network.
o Drone platform through Coalition network to INDOPACOM infrastructure down to
Services
o Intent is to have the group discuss possible pitfalls in C5ISR when facing a
sophisticated adversary.
What is Zero Trust?:
- NIST SP800-207 Definition and Terms
o General Architecture, Identification, Authentication, Authorization, Audit
o Policy Decision Points
o Policy Enforcement Points
o Policy Information Points
Identity Centric and Data-Centric methodologies
Applying Zero Trust
- IT Systems - assertion, measurement, authorization, audit
o Work through a simple implementation of a Zero Trust Architecture for
Coalition Sharing
- Operational Technology(OT)/Mission Systems
o Quick primer on OT
What is OT?, Why is it Important?
o Review on OT and Mission systems being very similar
o Work through a simple OT ZTA for Secure Mobile Devices on a Coalition
Network
Zero Trust Principles Applied in IT/OT/Mission
- Takes advantage of the continuum of IT to Mission (read OT)
- Continuous Validation and information move from the edge into more
consolidated computer environments.
- Ultimate enabler of secure sensor to shooter paradigm.
Beginning Scenario - now with Zero Trust Architecture applied
- Table top exercise: Apply Lessons learned on Zero Trust Architecture to an
introductory scenario
- If the session was beneficial the participants should be able to consider
where to employ Policy Decision Points\Policy Enforcement Points across
Mission/OT/IT Networks to employ Zero Trust Architecture principles against
the adversary scenarios defined at the beginning of the session.
Tracks:
Sponsored by:
Approved for 1 CompTIA CEU for: A+, Network+, Security+, Cloud+, Linux+; 1 GIAC CPE