About this Event
 
 
Virtual Cyber and IT Training Day for JBLM/JBER & the Pacific Northwest on Tuesday, March 16, 2021. The Virtual Cyber & IT Training Day will be hosted by the AFCEA Pacific Northwest Chapter (PNC). The purpose of this event is to further educate Cyber and IT warfighters, and professionals,  on the latest cybersecurity strategies, remediation techniques, and resilience tactics. This will be accomplished through SME speaker sessions, multiple instructional tracks, and a live exhibit hall featuring cyber industry innovations and IT modernization advancements. * This event is open nationwide  to all those that are interested in attending
**
 There is no fee to attend.
 
You can earn CPE/CEU Credit. The first 150 attendees will also receive a $15.00 complimentary lunch gift card from Grub Hub.
 

 
Current Agenda: 

 
TUESDAY, MARCH 16, 2021 | 9:30 AM – 3:20 PM PST
9:30am – 9:55am Platform Opens -  Exhibits Open 
9:55am – 10:00am Opening Remarks & Keynote Introduction 
10:00am – 10:30am  Opening Keynote: The Future of Cyber, – Cindy Thornburg, Cybersecurity Division Chief, Network Enterprise Center, 59th Signal Battalion, JBER 
10:30am – 10:45am  Break – Exhibits Open 
  Track 1:  Securing the Network & Mobile Devices  Track 2: IT Innovation Track 3: Cybersecurity 
10:45am – 11:15am Risk Management – Insights in a World Gone Mad- Phil Richards, CISO, Ivanti  Protecting Your Cloud with a Zero Trust Environment,  Andrew Balzarini, Director of Alliances, Wildflower Zero Trust Access and Controlling Access by Users and Devices to Networks and Applications - Benjamin Brooks, Systems Engineer, Fortinet
11:15am – 11:30am Break - Exhibits Open 
11:30am – 12:00pm Achieving Instant Situational Awareness in Multi-Domain Command and Control Environments - Mari Celestine, Sales Director, Thinklogical Implementing Cloud for Your Needs Jeffrey Phelan, Public Sector CTO/ Digital Transformation Strategist, Rubrik NIGHTMARE at 20,000 FEET - - Westley McDuffie, Security Evangelist, IBM
12:00pm – 12:15pm Break -  Exhibits Open (Grab Your Lunch!)
12:15pm – 12:45pm Protecting Sensitive Areas from Wireless Espionage - John Piccininni, Vice President of Business Development, Inpixon Why you need Cyber Range as a Service - Charles Reynolds, Founder and CTO, Technical System Integrators  DevSecOps: OWASP Top 10 Silver Bullet -Keatron Evans, Infosec Skills Author, InfoSec Institute
12:45pm – 1:00pm Break -  Exhibits Open 
1:00pm – 1:30pm  Securing Mobile Devices for Federal Secure Spaces - Blake Kotiza, VP of Sales, Privoro Three Critical Capabilities for Always On, Fully Optimized Mission Systems - Steve Mazzuca, DoD & IC Director, Willie Hicks, Federal CTO, Dynatrace Zero Trust: Identity Security -  Kevin Jermyn, Federal Customer Success Manager, CyberArk
1:30pm – 1:45pm  Break -  Exhibits Open (Exhibits Close at 1:45pm) 
1:45pm – 2:15pm  Threats Below the Surface In High Risk Environments, John Loucaides, Eclypsium Stronger Insights for Global Data Visibility - Rodney Hess, Veritas Technologies Modernizing Security with Threat Reconnaissance - David Monnier, Fellow, Team Cymru
2:15pm – 2:45pm  Cellular and RF-based Threat Detection - Dr. Bob Baxley, CTO, Bastille Securing Software Supply Chains, John Zanni, CEO, Acronis SCS Business Partners, Compromised? The Evolution of BEC Phishing Attacks - Dom Yip, Director Sales Engineering, Area 1


The Event will Feature

Multiple Speaker Sessions, Virtual Exhibit Hall, Attendees Will Receive CPE/CUE Credit for Participating, Lunch Gift Cards and More! 
 
Event Gamification
 
 The first 150 attendees are eligible for a complimentary lunch in the form of a Grub Hub e-gift card. Attendees will need to accumulate 100 points at the event.
 
Points can be accumulated by any of the following ways: 
 
·      Visit an Exhibit Booth = 4 points per booth
·      Download any material from an exhibit booth = 3 points/download
·      Watch a Speaker Session = 2 points per session 

·      Chat with an exhibitor representative = 2 points per chat 
 

EXHIBITORS & SPONSORS




Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation. From a leader in APM, to defining a new category - Software Intelligence. We don't just market cloud transformation. We live it. 




Fortinet (NASDAQ: FTNT) provides federal government customers with complete visibility and control across the expanding attack surface and the power to take on ever-increasing performance requirements today and in the future.

The federal government owns some of the world’s most sensitive—and coveted—data. Compromised systems can lead to disastrous consequences—for national security, the economy, and technological innovation. By providing integration, automation, compliance, and performance at scale, Fortinet offers federal agencies world-class solutions for on-premises perimeter security, secure remote access, multi-domain networks, advanced threat protection, zero-trust network access, operational and security awareness, third-party and insider threat protection, and many other needs. Learn more at www.FortinetFederal.com.

Certs: Our certifications/lists include FIPS 140-2, USGv6, NIAP Common Criteria, DoDIN APL, NSA Commercial Solutions for Classified Programs (CSfC) Components List, and CDM.




IBM Security develops intelligent enterprise security solutions and services to help your business prepare today for the cyber security threats of tomorrow.




  • Ivanti automates IT and Security Operations to discover, manage, secure and service from cloud to edge. From PCs to mobile devices, VDI, and the data center, Ivanti discovers IT assets on-premises, in cloud, and at the edge, improves IT service delivery, and reduces risk with insights and automation. To learn more, visithttps://www.ivanti.com.





Rubrik is a cloud enabling solution. With the ability to protect your data on-prem or in the cloud, Rubrik was built for today’s current and future challenges – on-prem backup & recovery, cloud migration, cloud native backups, searchability no matter where data lives, and automation to reduce menial tasks.
As the only vendor certified with both the DoDIN and DHS APL, we are proud to offer world class data protection and an added layer of defense against
ransomware attacks.




Wildflower International is a small, minority-owned, woman-owned, HUBZone business, serving the Federal Government and its National Laboratories for three decades. We have long-term experience delivering comprehensive information technology products, services, and solutions with a proven record of accomplishments. Our solutions are available via a variety of contract vehicles including, CHESS ITES-3H, SEWP V, DHS First Source II, DOE ICPT, SCMC, and GSA. We are a Dell Federal Titanium Partner.




Founded in 1992, Westwind provides comprehensive, integrated IT products and services to government agencies as well as commercial enterprises throughout the US. We have expertise in emerging technology (3D print services, and unmanned vehicles), life-cycle management, and integrated solutions (computers, peripherals, data centers, AV equipment, and secure networking). Over the years, Westwind has established strong partnerships with a variety of vendors to provide our customer with the best products and services while meeting their contracting needs.




Absolute is the first and only company to offer uncompromised visibility and near real-time remediation of security breaches at the source. Our Absolute Persistence self-healing endpoint security technology gives security and IT pros complete control over their devices and data. No other technology has the power to withstand user error or malicious attacks, and return devices to an original state of safety and efficacy.




Acronis SCS is an American cyber protection and edge data security company exclusively dedicated to meeting the unique requirements of the US public sector. Our innovative and comprehensive cyber protection, backup and disaster recovery, anti-ransomware, and enterprise file sync and share software solutions ensure operational assurance and data security across America’s federal, state and local government, education, healthcare, and nonprofit computing environments.




Zimperium, the global leader in protecting enterprises from mobile risks, offers the only real-time, on-device, machine learning-based protection against Android, iOS and Chromebooks threats. Powered by our z9 machine learning detection engine, Zimperium’s solutions protect mobile endpoints and apps against device, network, phishing and malicious app attacks.




Area 1 Security offers the only pay-for-performance solution in the cybersecurity industry - and the only technology that comprehensively blocks phishing attacks before they damage your business. Phishing is the root cause of 95 percent of security breaches. Area 1 Security works with some of the most sophisticated organizations in the world, including Fortune 500 banks, insurance companies, and healthcare providers to preempt and stop targeted phishing attacks at the outset, improve their cybersecurity posture and change outcomes. Learn more at www.area1security.com, join the conversation at @area1security, or subscribe to the Phish of the Week for the latest industry news and insights on how to deal with phishing.




Bastille provides full visibility into the known and unknown mobile, wireless and Internet of Things (IoT) devices inside an enterprise’s corporate airspace – together known as the Internet of Radios. 




About Team Cymru

Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams, enabling them to track and take down threat actors, criminals, terrorists and human traffickers around the globe. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. The company’s Community Services division provides no cost threat detection and intelligence to network operators, hosting providers and more than 130 CSIRT teams across 86+ countries. Enterprise security analysts rely on its Pure Signal™ threat intelligence platform for on-demand access to global internet traffic telemetry, which allows them to see what’s happening virtually anywhere across the internet with a clarity similar to that of their own internal network telemetry. With this visibility, they close detection gaps, accelerate incident response, and get ahead of critical, recurring threats – mapping and monitoring threat infrastructures around the world and blocking attacks before they are launched. For more information visit https://team-cymru.com/




Inpixon is a world leader in indoor intelligence. Our indoor location and data platforms and patented technologies empower users to harness the power of indoor data to create actionable intelligence. We specialize in capturing, interpreting and visualizing indoor data to make indoor spaces smarter, safer and more secure.

Our solutions are leveraged by a multitude of industries and disciplines to do good with indoor data. This multidisciplinary depiction of indoor data enables users to increase revenue, decrease costs, and enhance safety. Inpixon customers can take advantage of mapping, positioning, analytics, sensor fusion and the Internet of Things (IoT) to uncover the untold stories of the indoors.




Privoro is leading the way in mobile security hardware systems – enabling organizations to adopt a zero trust posture against commercial mobile devices while delivering high-security services and unsurpassed control.




For more than thirty-five years, Targus has been implementing purposeful solutions to provide you with the tools you need to succeed – from laptop bags to tablet cases to peripherals and universal docking stations. Our insight-driven approach, global reach, and commitment to quality ensures we have the skills and experience to meet your performance, style, and protection needs – whether you’re a large enterprise, a small business, or an individual who needs to get work done. Our mission drives us, our passion fuels us, and our customers make us everyday, inspired.




CyberArk is the global leader in privileged access management, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce the risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders.




Eclypsium is the most comprehensive cloud-based device security platform for modern distributed organizations. From corporate laptops to network equipment to servers in data centers, we protect the devices you rely on all the way down to the firmware and hardware level. The Eclypsium platform provides security capabilities ranging from basic device health and patching at scale to protection from the most persistent and stealthiest threats. For more information, visit eclypsium.com.




Meet DoD 8570/8140 certification requirements
 
Train live online, in person or on-demand — and get certified, guaranteed. Stay compliant and simplify your procurement process with over 50 approved training courses. Upskill and get certified with the hands-on cybersecurity training platform that moves as fast as you do. Train on your schedule with unlimited access to 100s of hands-on cybersecurity courses and cyber ranges — or upgrade to a boot camp for live, instructor-led training guaranteed to get you certified on your first attempt. Visit us in the exhibit hall or learn more at www.infosecinstitute.com.




  • TSI is a VAR/SI focusing on the integration of leading edge technologies and point tools delivered as high performance systems and solutions.

 
Our ‘as a Service’ automation framework allows our customers to have integrated AND standardized environments accessed by a single pane of glass for all aspects of lab, range, or infrastructure development, deployment, consumption, and lifecycle management.  This environment is then provided to end users through a self-service web portal for training, testing, and even simple tasks such as IT deployment and scheduling.

We also offer a superior network fabric based on PCIe - it's incredible - ask us about that!


 
  •  
  • DELIVERING YOUR TECHNOLOGY ‘as a Service’
  •  
  • www.tsieda.com
  •  
  • Please check out our booth!




EFFECTIVE IT/CYBER CERTIFICATION TRAINING COURSES
Whether it be Live in Person, Onsite, Live Online or Self-Paced, We select the best real world instructors to teach our live in-person and live online courses to bring you cyber security training courses wherever you are around the world. We partners with the best technology providers around to bring you lag-free video training and a fully automated robust online cyber range. Contact us for for full schedule of Online Courses. https://www.gmancybersecurity.com




Multiple Classifications. One System. Secure Infrastructure Solutions for JADC2. Thinklogical empowers the warfighter by enabling immediate and secure access to multi-domain, multi-classification information in C2 applications. Our next-generation command and control infrastructure helps transform data into knowledge, which drives better-informed decisions leading to improved mission outcomes.

Thinklogical solutions enable instant situational awareness and real-time collaboration, delivering a "single pane of glass" view to multi-domain data and simplifying the management of multi-classification information through a single video distribution switching system. Applications include command and control, air operations, secure VTC, UAS/RPA ground control stations, and training and simulation.

Made in the USA and ISO 9001:2015 certified, Thinklogical products are IA accredited to the Common Criteria EAL4, NATO NIAPC, TEMPEST SDIP 27 Level B and the U.S. DoD DISA JITC UCR APL 2013.




With the Veritas Enterprise Data Services Platform, the DoD can accelerate its digital transformation and address pressing IT and mission-critical challenges, from multi-cloud data management, data protection and storage optimization to compliance readiness and workload portability—with no cloud vendor lock-in.




For over 30 years, Getac has been manufacturing rugged computers for some of the most demanding users in the harshest environments. As a leading rugged computer manufacturer, Getac offers the most extensive rugged computing product line, including laptop and tablet computers.  Getac products can be found across the globe in every branch of the US military, including DOD deployments and federal civilian agencies where reliability is crucial to mission success. For more information, visit www.Getac.com.




The mission of Capitol Technology University is to educate individuals for professional opportunities in engineering, computer and information sciences, and business.  We provide relevant learning experiences that lead to success in the evolving global community.




T-Mobile now has America's largest AND fastest 5G network. T-Mobile for Government provides solutions that protect critical data to giving you a simpler way to manage your fleet, our federal government solutions are designed to help support your agencies.




InfraGard Alaska Members Alliance is the local chapter associated with the InfraGard National Member Alliance. We are approximately 200 Alaskans, partnered with the Alaska Field Office of the FBI. Our public and private partners provide subject matter expertise, information sharing and other intelligence, in an effort to prevent hostile acts against Alaska's people, infrastructure, organizations, assets and resources. Our services are voluntary with coordination from a liaison Special Agent. All services are provided within a context of trust. Integrity is foundational to our organization and our standard of ethics is of the highest order. We work to address emergent and ongoing concerns in cyber domains, terror response, intelligence, criminal deterrence, and other Alaskan and national security matters to increase resiliency. https://www.infragard.org




The Association of Old Crows (AOC) is a not-for-profit international professional association with over 13,000 members and 200+ organizations engaged in the science and practice of Electronic Warfare (EW), Information Operations (IO), and related disciplines.
 
This AOC Chapter was originally chartered in the early 1970s as the "Prowler Roost Chapter" to provide a professional Electronic Warfare (EW) forum for the new EA-6B Prowler community.  Since 1978 it has participated in every EW Symposium at NAS Whidbey Island and since 1986 has provided administrative support for registration and management of Symposium events.
 
Technology and tactics have expanded capabilities, roles, and impacts of EW.  To recognize our shipmates at NAS Whidbey Island with related missions such as CPRW-10 with its very special VP and VQ platforms; Navy Information Operations Command (NIOC) Whidbey Island; Aviation EW School (AVEWS); Electronic Attack Weapons School (EAWS); and many others, our members voted to change the Chapter name officially to the "Whidbey Roost Chapter".  We refer to ourselves as "Whidbey Roost Old Crows". https://www.whidbeyroost.org




Since the early 1900s, the men and women of the Washington Air National Guard have served our state and nation nobly. Today, more than 2,000 citizen-airmen across the state support the Washington Air National Guard and lead a variety of missions – from refueling military jets, to enhancing cyber security, to providing much needed assistance during state emergencies.
 
Comprised of two wings – the 141st Air Refueling Wing in Spokane and the 194th Wing on Camp Murray – as well as the Western Air Defense Sector at Joint Base Lewis McChord, the Washington Air National Guard offers our state and nation cutting edge capabilities to increase our security. https://www.goang.com/locations/washington.html