TechNet Indo-Pacific 2023 Supporting Partner Opportunities


The TechNet Indo-Pacific Sponsorship Gallery is SOLD OUT.

AFCEA has developed an enhanced Supporting Partner program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Opportunities, and Branding Opportunities.

Have an idea for a Supporting Partner Opportunity not listed below? We are here to ensure you have the best conference experience. We are happy to create a custom package to meet your specific needs. Let us know your vision, objective and budget and we’ll create a customized opportunity just for you.

Breakout Session: Beans, Bullets, and Bytes: Realizing the Promise of Zero Trust

  • Room: Honolulu Suite 1
Tuesday, November 07, 2023: 3:30 PM - 4:30 PM

Speaker(s)

Speaker (confirmed)
Conrad Maiorino
Federal Systems Engineer
Zscaler
Speaker (confirmed)
Russ Smith
Field CTO
ZScaler

Description

Enabling a data centric Army requires a culture shift in how the Army deploys cyber capabilities for its forces. Warfighters must have access to critical data for mission success, and deploying network technology across multiple classification levels, like unclassified NIPRNet, secret SIPRNet, or top secret JWICS, as well as large computing and storage capability to process data is the mission of Cyber and Signal leaders.

However, successfully operating with agility and within a contested cyber domain requires fully embracing the tenants of zero trust to access applications and data that are moved into the cloud from anywhere on the globe. Zero trust recognizes the shortcomings of network security and instead builds security into the connection through policy decision making and policy enforcement. The policy determines whether a user at an endpoint has the appropriate access permissions, to include security classification of the user, to login to a military application to view or manipulate data.

Within zero trust, a secure and protected connection between each end is completely independent of the underlying network infrastructure. Fully embracing zero trust, and its focus on securing data, not networks for a data centric Army clears the way to think of a network as just a means of transport, reversing three decades of designing, developing, implementing, and operating secure networks at multiple classification levels.

The culture shift from network-centricity to data-centricity enables an agile Army to fully integrate ubiquitous public network access with cloud services, and thanks to zero trust, that data is secured for mission success.

Key Points:

  • Why so much buzz around zero trust? Is it real or a buzz word?
  • How does the Army outpace the adversary in a contested cyber domain?
  • The push to remote work taught industry that it is possible to securely access the cloud via the public internet to access data. What should the Army take away from that?
  • How does zero trust enable Joint All-Domain Command and Control (JADC2) and the Army’s Unified Network Optimization (UNO)?

Listen to recording


Tracks:


Sponsored by:


Click here for Continuing Education approvals