All DOE, DoD, GOVERNMENT, ACADEMIA & INTERESTED CYBER PROFFESIONALS –

YOU ARE INVITED!
 
All those interested in attending are welcome to join us on Thursday, June 17th for the Cyber & Information Technology Day.

THERE IS NO FEE TO ATTEND!
The event will take place from 9:00 AM - 2:00 PM MDT. 
 
** This event is virtual and is open to anyone nationwide. Please invite your colleagues and co-workers. **
 
This event will feature  multiple Speaker Tracks | Speaker Sessions, live and live Exhibits. Attend and  learn about best practices and strategies.
This is an excellent opportunity to view and virtually demo the latest cybersecurity and information products and services available today.

Attendees will receive CPE/CEU Credit. The platform will track attendees time in the event, and session time.
 
Complimentary lunch will be provided for the first 150 people that register and participate.


LEARN ABOUT THE LASTEST IN:
  • NIST Compliance
  • CMMC
  • Big Data
  • Cybersecurity
  • Cloud Computing
  • Storage
  • Hardware
  • Software
  • And Much More!


TECHNICAL PRESENTATIONS:

Throughout the program, there will be technical presentations discussing the latest advances in a variety of cybersecurity topics. Please see below for the current agenda: 




Thursday, June 17, 2021 | 9:00 AM – 2:00 PM MDT
9:00 am – 9:20 am Platform Opens -  Exhibits Open 
9:20 am – 10:00 am  Opening Keynote – Cyber Security Snake Oil and CMMC Brigadier General Raphael Warren (ret), President & CEO, Spartan  Cyber Security
10:00am – 10:15am  Break – Exhibits Open 
10:15am – 10:45am Track 1:   Track 2: Track 3:
Network & Mobile Security  IT Innovation Cybersecurity 
Ivanti - Risk Management : Insights in a World Gone Mad Dell Technologies: Transition to AIOps Sonatype – Securing the Federal Software Supply Chain
10:45am – 11:00am Break - Exhibits Open 
11:00am – 11:30pm T-Mobile – 5G Security Update Wildflower – Wildflower International Introduces PowerScale by Dell Technologies  Thales Zero Trust: Beyond the Buzzword
11:30am – 11:45pm Break -  Exhibits Open (Grab Your Lunch!)
11:45pm – 12:15pm Eclypsium – Threats Below the Surface In High Risk Environments Rubrik – Protect, Share, and Access Your Data at the Speed of Innovation: Next Generation Data Management for Strategic Advantage Sailpoint – Identity Security Transcends Access Management – Efficient Access Modeling
12:15pm – 12:30pm Break -  Exhibits Open 
12:30pm – 1:00pm  Privoro - Securing Mobile Devices for Federal Secure Space Rockport and Alliance: Rethinking the Network and Active Archiving for HPC Tanium – Endpoint Management and Security Built for a Distributed World 
1:00pm – 1:30pm Inpixon - Protecting Sensitive Areas from Wireless Threats MathWorksThe Key Role of Data in Modern AI-Powered Systems Recorded Future - Anticipation in the Age of Risk: Threat Intelligence to Meet the Challenge of Protecting Energy, Utilities, and Critical Infrastructure
1:30 – 2:00  NIH NITAAC – Reimagining Acquisitions with NITAAC
 
EXHIBITOR SHOWCASE: 

The Exhibit Showcase offers an excellent opportunity to learn about the latest advances in cybersecurity and information technology through an interactive approach with attendees. Participants will showcase their products and services, and will be there live to answer your questions throughout the event.


COMPLIMENTARY LUNCH: 

An e-gift card to Grubhub or the Hot Rocks Java Café (Los Alamos Research Park) will be provided for the first 150 people that register and participate.

Sponsors




Thales Trusted Cyber Technologies is a trusted, U.S. based source of cyber security solutions for the U.S. Federal Government. Our solutions enable agencies to deploy a holistic data protection ecosystem where data and cryptographic keys are secured and managed, and access is controlled.




NITAAC provides low-cost, high-quality IT products and services to every government agency through our three BIC GWAC contracts.




Area 1 Security offers the only pay-for-performance solution in the cybersecurity industry - and the only technology that comprehensively blocks phishing attacks before they damage your business. Phishing is the root cause of 95 percent of security breaches. Area 1 Security works with some of the most sophisticated organizations in the world, including Fortune 500 banks, insurance companies, and healthcare providers to preempt and stop targeted phishing attacks at the outset, improve their cybersecurity posture and change outcomes. Learn more at www.area1security.com, join the conversation at @area1security, or subscribe to the Phish of the Week for the latest industry news and insights on how to deal with phishing.




Bastille provides full visibility into the known and unknown mobile, wireless and Internet of Things (IoT) devices inside an enterprise’s corporate airspace – together known as the Internet of Radios. 




CIS Secure is a recognized leader in the secure communications market, providing solutions for government and commercial customers worldwide. CIS designs and manufactures a wide range of products, which include solutions that comply with TSG and TEMPEST certifications from secure voice and video conferencing systems to a variety of specialty systems used in classified and unclassified networks, in addition, to secure mobility and encrypted tactical solutions. CIS Secure serves those whose missions depend heavily on their ability to communicate and securely exchange information – voice, video, or data – to meet the strictest government standards and often in the most challenging physical environments.
 
CIS Mobile is a subsidiary of CIS Secure. CIS Mobile developed the secure mobility platform, altOS, that provides government users across the globe with the ability and control to protect sensitive data on their mobile devices.




About Team Cymru

Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams, enabling them to track and take down threat actors, criminals, terrorists and human traffickers around the globe. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. The company’s Community Services division provides no cost threat detection and intelligence to network operators, hosting providers and more than 130 CSIRT teams across 86+ countries. Enterprise security analysts rely on its Pure Signal™ threat intelligence platform for on-demand access to global internet traffic telemetry, which allows them to see what’s happening virtually anywhere across the internet with a clarity similar to that of their own internal network telemetry. With this visibility, they close detection gaps, accelerate incident response, and get ahead of critical, recurring threats – mapping and monitoring threat infrastructures around the world and blocking attacks before they are launched. For more information visit https://team-cymru.com/




Inpixon is a world leader in indoor intelligence. Our indoor location and data platforms and patented technologies empower users to harness the power of indoor data to create actionable intelligence. We specialize in capturing, interpreting and visualizing indoor data to make indoor spaces smarter, safer and more secure.

Our solutions are leveraged by a multitude of industries and disciplines to do good with indoor data. This multidisciplinary depiction of indoor data enables users to increase revenue, decrease costs, and enhance safety. Inpixon customers can take advantage of mapping, positioning, analytics, sensor fusion and the Internet of Things (IoT) to uncover the untold stories of the indoors.




  • Ivanti automates IT and Security Operations to discover, manage, secure and service from cloud to edge. From PCs to mobile devices, VDI, and the data center, Ivanti discovers IT assets on-premises, in cloud, and at the edge, improves IT service delivery, and reduces risk with insights and automation. To learn more, visithttps://www.ivanti.com.




Privoro is leading the way in mobile security hardware systems – enabling organizations to adopt a zero trust posture against commercial mobile devices while delivering high-security services and unsurpassed control.




Zimperium, the global leader in protecting enterprises from mobile risks, offers the only real-time, on-device, machine learning-based protection against Android, iOS and Chromebooks threats. Powered by our z9 machine learning detection engine, Zimperium’s solutions protect mobile endpoints and apps against device, network, phishing and malicious app attacks.




Dell Technologies offers the technology expertise, end-to-end solutions and world-class services you need to be prepared for what comes next. We’re here to help you grow and thrive.




Rockport and Alliance: Simplifying the Network for HPC
Alliance Technology Group has partnered with Rockport Networks to deliver the next generation of high-performance networks. Deployed without centralized switches, the Rockport Switchless Network eliminates inherent performance bottlenecks of traditional network architectures — while reducing heat, power, rack space, and management complexity.

Alliance Technology Group is a North American Systems Integrator & IT Solutions/Services company. Alliance specializes in IT Infrastructure; Physical & Cyber Security, Storage, Systems and Networking. Our Team deploys these solutions in Traditional IT Enterprises, Private, Public & Hybrid Clouds and IoT & Edge Environments. Alliance's Consulting & Professional Services Group provides expert support for all of the solutions we offer including design, implementation and managed services. Alliance serves customers in the Private & Public sectors and has become a trusted partner to increase the effectiveness of how IT positively impacts business.

Rockport Networks is reimagining the next generation of high-performance networks with a switchless architecture that delivers better performance at scale, simplified. Ending decades of unnecessary network complexity, the Rockport Switchless Network replaces centralized switch fabrics with a distributed, highly reliable, high-performance interconnect providing connectivity that is intelligent, adaptable, self-healing, and simple to operate. By partnering with Alliance Technology Group, Rockport is committed to help its customers Simplify the Network.®




MathWorks is the leading developer of mathematical computing software. Engineers and scientists worldwide rely on its products to accelerate the pace of discovery, innovation, and development.




Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world.




 

Rubrik is a cloud enabling solution. With the ability to protect your data on-prem or in the cloud, Rubrik was built for today’s current and future challenges – on-prem backup & recovery, cloud migration, cloud native backups, searchability no matter where data lives, and automation to reduce menial tasks.
As the only vendor certified with both the DoDIN and DHS APL, we are proud to offer world class data protection and an added layer of defense against

ransomware attacks.




SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting government agencies from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of organizations worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, ensuring that each worker has the right access to do their job – no more, no less. With SailPoint as foundational to the security of their organization, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.  




Sonatype is laser focused on helping organizations continuously harness all of the good that open source offers, without any of the risk. To do this, we’ve invested in knowing more about the quality of open source than anyone else in the world. This investment takes the form of machine learning, AI, and human expertise, which in aggregate, produces highly curated intelligence that is infused into every Nexus product. Over 1,000 organizations and 10 million developers use Sonatype to make better decisions, innovate faster at scale, and rest comfortably knowing their applications consist of the highest quality open source components.




Tanium provides endpoint management and security built for the world’s most demanding IT environments. Our breakthrough approach decentralizes data collection, aggregation and distribution down to the endpoint, providing real-time visibility, comprehensive control, and rapid response. This is why multiple branches of the US Armed Forces trust Tanium to support their missions with comprehensive visibility, threat detection, and response across global operations. Learn more at federal.tanium.com


 




T-Mobile now has America's largest AND fastest 5G network. T-Mobile for Government provides solutions that protect critical data to giving you a simpler way to manage your fleet, our federal government solutions are designed to help support your agencies.




Wildflower International Ltd, is a small, minority-owned, woman-owned, HUBZone business, serving the Federal Government and its National Laboratories for three decades. We have long-term experience delivering comprehensive information technology products, services, and solutions with a proven record of accomplishments. Our solutions are available via a variety of contract vehicles inlcuding, CHESS ITES-3H, SEWP V, DHS First Source II, DOE ICPT, SCMC, and GSA. We are a Dell Federal Titanium Partner and were awarded Juniper Networks Federal Partner of the Year for both 2018 & 2019.




Eclypsium is the most comprehensive cloud-based device security platform for modern distributed organizations. From corporate laptops to network equipment to servers in data centers, we protect the devices you rely on all the way down to the firmware and hardware level. The Eclypsium platform provides security capabilities ranging from basic device health and patching at scale to protection from the most persistent and stealthiest threats. For more information, visit eclypsium.com.




Illumio is a cybersecurity software company enabling end-to-end Zero Trust in Defensive Cyberspace Operations. The company helps agencies, commands, and organizations achieve Zero Trust and prevent attacker lateral movement by protecting high value assets, critical applications, and workloads through real-time application dependency mapping, coupled with host-based micro-segmentation. Illumio is FIPS 140-2 validated and NIAP Common Criteria Protection Profile Certified. Illumio can be placed in multi-vendor hardware environments, using existing infrastructure to improve agencies’ cybersecurity postures and effectively accomplish their missions.




Epoch Concepts is a partner and value-added reseller to the U.S. federal government and commercial organizations around the country. The Epoch Concepts' difference is our deep experience working in, and with, organizations like yours. Unlike typical VARs, we offer an end-to-end, design-to-implementation experience tailored to your unique organizational needs.

Anchored in decades of hands-on experience and an unwavering client-first commitment, our seven-step process for designing and implementing mission-critical technologies puts your goals and challenges at the center of everything we do.

With a partner network of more than 100 of the world's most advanced technology vendors, like Dell Technologies, we can design, source, and implement a fully customized turnkey system that meets your needs now and for years to come.


Learn more at www.epochconcepts.com

 




Arista Networks is an industry leader in networking solutions for data center and campus environments. Arista's award-winning platforms, ranging in Ethernet speeds from 10 to 400 gigabits per second, deliver availability, agility, automation analytics, and security through CloudVision® and Arista EOS®, an advanced network operating system.

 




DocuSign helps organizations connect and automate how they prepare, sign, act on, and manage agreements. As part of the DocuSign Agreement Cloud, DocuSign offers eSignature: the world's #1 way to sign electronically on practically any device, from almost anywhere, at any time. 

Business runs on agreements. Government business is no exception. More than 1,300 local, state, and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, prepopulated agreements, and automated approval processes.




Fortinet (NASDAQ: FTNT) provides federal government customers with complete visibility and control across the expanding attack surface and the power to take on ever-increasing performance requirements today and in the future.

The federal government owns some of the world’s most sensitive—and coveted—data. Compromised systems can lead to disastrous consequences—for national security, the economy, and technological innovation. By providing integration, automation, compliance, and performance at scale, Fortinet offers federal agencies world-class solutions for on-premises perimeter security, secure remote access, multi-domain networks, advanced threat protection, zero-trust network access, operational and security awareness, third-party and insider threat protection, and many other needs. Learn more at www.FortinetFederal.com.

Certs: Our certifications/lists include FIPS 140-2, USGv6, NIAP Common Criteria, DoDIN APL, NSA Commercial Solutions for Classified Programs (CSfC) Components List, and CDM.




Advance your mission transparently and efficiently with Galvanize’s analytics powered, cloud-based security, risk management, compliance, and audit software. We unite and strengthen individuals and entire federal government agencies through our integrated HighBond software platform. Whether these professionals are managing threats, assessing risk, identifying fraud, measuring controls, or monitoring compliance, HighBond automates manual tasks, blends agency-wide data, and broadcasts it in easy-to-share dashboards and reports.

Having achieved IL5 Provisional Authorization, Galvanize’s HighBond platform solutions, including cloud robotics, are available for defense agencies to manage their most sensitive controlled unclassified information (CUI), as well as unclassified National Security Systems (NSSs). HighBond products we're highlighting today  include:
 
CyberBond—Drive intelligent, risk-based decision making. When working with multiple tools across an agency, it can be hard to sift through and prioritize the masses of threat, vulnerability, and security events data. CyberBond helps by consolidating disparate information and relationships across an agency’s tech stack and uses automation to drive intelligent decisions. The cyber risk elements are processed through out-of-the-box or user-defined risk-based workflows, which automatically assign tasks, send notifications, and create escalations so you can prioritize your remediation efforts based on risk.
 
ITRMBond—Deploy an intelligent IT and cyber risk management program to swiftly prevent, identify, and mitigate risk. Automate critical risk and compliance workflows and save time every day in IT asset and cyber risk management. Prioritize the most critical assets and riskiest vulnerabilities in order to drive down risk faster. Drive consistency across the organization and get quick time-to-value with a scalable, centralized cloud-based platform that is pre-configured with best-in-class risk management workflows. Deliver instant visibility into IT and cyber risk and compliance at a glance with ready-to-use visualizations and executive dashboards that enable rapid data-driven decision-making.

ThirdPartyBond—Effectively manage your third-party risk program. Quickly identify your riskiest third parties, continuously monitor their performance, and efficiently prioritize risk remediation efforts.
Manage large inventories of third parties at scale with one centralized platform. Ensure regulatory and contractual compliance with a few simple clicks. Make data-driven decisions and be audit-ready at all times with a programmatic process, workflow automation, and visual storyboards that display third-party risk at a glance.
 




Google Cloud is a Public Sector cloud service provider (CSP) that leverages world-class technology and innovation to deliver "Scientific Computing as-a-Service" in support of the DOE complex.  Google Cloud leverages an open source-centric approach to software engineering and we believe in a hybrid and/or multi-cloud approach.  This approach is supported by Google Cloud Platform (GCP) services such as Anthos and Kubernetes.  Google Cloud's key differentiators as they pertain to DOE include big data analytics; artificial intelligence and machine learning, and global networking.  Additonally, Google operates the world's cleanest cloud running on 100% renewable energy.  Our goal is to compliment DOE's powerful on-prem infrastructure by leveraging Google Cloud to extend, augment, and enhance DOE's signifcant computing infrastructure.




Founded in 1992, Westwind provides comprehensive, integrated IT products and services to government agencies as well as commercial enterprises throughout the US. We have expertise in emerging technology (3D print services, and unmanned vehicles), life-cycle management, and integrated solutions (computers, peripherals, data centers, AV equipment, and secure networking). Over the years, Westwind has established strong partnerships with a variety of vendors to provide our customer with the best products and services while meeting their contracting needs.




Winsted is the global leader in the most technologically and ergonomically advanced control room console and furniture solutions.  Whether a simple one operator workstation or a complex multiple operator control room, Winsted manufactures attractive, ergonomic consoles that work with your operators to improve comfort and optimize efficiency. We offer stock, customized and custom consoles suitable for any control room or technical furniture application. 

Whether you are building a state-of-the-art control room from the ground up, or simply need to upgrade your operations, Winsted can provide the ideal solution.  Our experts combine the disciplines of industrial design, ergonomics and interior design to create solutions that reduce fatigue, improve productivity and inspire.  Our commitment to customer service is second-to-none and your satisfaction is guaranteed.

Our design software is an excellent vehicle for a consultative process that is interactive and allows for real time review of layouts and options for not only consoles and workstations but ancillary furniture solutions such as storage, conference tables and credenzas, monitor wall mounting systems, racks and other related components.  We are experts in not only command and control consoles but the technology that can be deployed with our systems, assuring a solution that encompasses the considerations of functionality, ergonomics and access to equipment.  Our materials are GreenGuard Gold Certified and guaranteed for mission critical 24/7 operation!




G-MAN Cyber Security Offers World Class Cyber Certification Training, Network Vulnerability and Information Technology Solutions To Government Agencies And The Organizations That Support Them.
 
EFFECTIVE IT/CYBER CERTIFICATION TRAINING COURSES
Whether it be Live in Person, Onsite, Live Online or Self-Paced, We select the best real world instructors to teach our live in-person and live online courses to bring you cyber security training courses wherever you are around the world. We partner with the best technology providers around to bring you lag-free video training and a fully automated robust online cyber range. Contact us for for full schedule of Online Courses. Check out the new EC-COUNCIL CERTIFICATION CLUB-https://www.gmancybersecurity.com/iclass-certification-club
 
PENETRATION TESTING
Penetration testing is a foundational component of every proactive cybersecurity program. It is critical to find your exploitable vulnerabilities before the cyber criminals, giving you the opportunity to secure your environment. From web application and cloud environments to internal and external networks, and even physical intrusion to restricted areas, our team will design the penetration test that matches your business objectives.  All penetration tests and cyber risk assessments are conducted by a U.S. based team of industry experts, with respected credentials and strong ethics.
 
Contact us for more info or questions on our services.
info@gmancybersecurity.com




EFFICIENT & RELIABLE TECHNOLOGY SOLUTIONS IN SOUTHWEST
 
Spartan Cyber Security LLC is an Information Technology company, specializing in all aspects of Cyber Security and Information Technology. As a leading Cyber Security company, we strive to stay on the cutting edge, with a focus on Cyber Security Compliance policy and procedures. We excel in innovation, efficiency, and creativity. We specialize in cyber security solutions. We proudly offer emergency repairs, 24/7 support, competitive rates, and free estimates to the people of Southwest. We invite you to explore our website, discover our services, and get in touch with us if you have any questions. We are looking forward to hearing from you. A real life, flesh and blood human is standing by to take your call




Absolute is the first and only company to offer uncompromised visibility and near real-time remediation of security breaches at the source. Our Absolute Persistence self-healing endpoint security technology gives security and IT pros complete control over their devices and data. No other technology has the power to withstand user error or malicious attacks, and return devices to an original state of safety and efficacy.