1 cyber defense and network security Securing Sensitive Networks Through Collaboration and Technology June 24, 2013 Workshop Day June 25-26, 2013 Main Summit Washington DC Metro Area Sponsor & Exhibitor Prospectus
2 2013 CYBER DEFENSE & NETWORK SECURITY SPEAKERS Dr. Mark Maybury Chief Scientist and Author of Air Force Cyber Vision 2025 U.S. AIR FORCE Mr. Ray Letteer Director, Cyber Division U.S. MARINE CORPS Mr. Curtis Levinson U.S. Liaison for Cyber Security NATO LTC Christopher Quick Director, Strategic Communications, ARCYBER U.S. ARMY Mr. Howard Whyte Security Operations Director, Office of the Chief Information Officer NASA Ms. Sandra Stanar-Johnson Cyber Representative to the Department of Homeland Security NATIONAL SECURITY AGENCY Ms. Rosemary Shumba Program Director, Cyber Security and Information Assurance UNIVERSITY OF MARYLAND Mr. Greg Wilshusen Director of Information Technology GOVERNMENT ACCOUNTABILITY OFFICE Mr. Matthew Scholl Deputy Division Chief, Computer Security NIST Col (ret.) Cedric Leighton Founder CEDRIC LEIGHTON ASSOCIATES Dr. Douglas Maughan Director, Cyber Security Division, HSARPA DEPARTMENT OF HOMELAND SECURITY Ms. Karen Evans Director U.S. CYBER CHALLENGE Dr. Arun Sood Director, International Cyber Center GEORGE MASON UNIVERSITY LtCol (ret.) William Hagestad Author 21st CENTURY CHINESE CYBERWARFARE Mr. Joseph Trien Group Leader, Cyberspace Science OAK RIDGE NATIONAL LABORATORY Mr. Jeff Goldthorp Chief, Cyber and Information Reliability FEDERAL COMMUNICATIONS COMMISSION Mr. David Simpson Chief Technology Officer CYBER SECURITY FORUM INITIATIVE Capt Joshua Dixon Project Officer for Technology Transition U.S. MARINE CORPS Mr. Mark Loepker Director, National Information Assurance Partnership NATIONAL SECURITY AGENCY cyber defense and network security IDGA s Cyber Defense and Network Security Summit takes place just as the White House puts the finishing touches on the 2013 cybersecurity executive order and lays out the strategies and initiatives for the upcoming decade. Speakers from CYBERCOM, the Air Force, and Marine Corps will all share the latest cyber challenges and opportunities, while speakers from the Department of Homeland Security, National Security Agency and NATO will present on strategies for cyber intelligence sharing and real-time response to threats. What s New in 2013? This year we have included a full focus day on mobile security! The Department of Defense alone has 15, 000 computer networks connected to over 7 million mobile devices. Our mobile security focus day will address the security implications of mobile government and BYOD, the state-of-the-science in mobile security and more. Book your space today and start connecting with influential decision makers at Cyber Defense & Network Security
3 SPONSOR & EXHIBITOR INFORMATION WHY SPONSOR & EXHIBIT AT CYBER DEFENSE & NETWORK SECURITY 2013? There is already more than $500 million programmed into the current 5 year budget for various cyber security programs The White House is looking to strengthen the US cybersecurity by improving public-private information sharing Cyber Vision 2025 study has been completed and recommendations to improve agility and resilience, and to reduce complexity have been put into place. Key audience of CIOs, CTOs, Information Security Officers, IT Directors, Business Managers and Cyber Security Managers Simple and easy to set up. All booths are prepared and ready to go when exhibitors arrive. Basic materials are provided, compliments of IDGA. The event is widely recognized by the key industry and government agencies. POTENTIAL BENEFITS OF SPONSORING & EXHIBITING INCLUDE: Direct booth exposure to over 80 attendees Access to federal decision-makers in the cyber security space Get your company s latest products/services in front of your target audience and position yourself as an industry leader Exclusive discounted event registration for your colleagues and referrals Opportunity to reserve one of the few speaking slots available in the main conference Unique match making activities including exclusive networking events and private meeting areas available Understand the military market now in light of new government policies Presentations from 14+ military and government cyber experts Sponsor Attendee Passes Included, which provide access to: Keynote sessions Main Summit Delegate lunches Pre and post event publicity through complimentary marketing efforts such as, sponsorship listing on the event website, inclusion in targeted s and enewsletters, plus much more! RESERVE YOUR SPACE TODAY!
4 ATTENDEE DEMOGRPAHICS FAST FACT: Attendees of Cyber Defense & Network Security come from The United States, Canada, Brazil, Japan, South Korea, among others. Plus, there is representation from the Air Force, Navy, Army, NCSD, DARPA, CIA, - all under one roof for you to network with! HERE IS A SAMPLE OF PAST ATTENDS OTHER JOB TITTLES IN ATTENDANCE Analyst Associate Professor of Information Operations and Cyberspace Operations Branch Chief Cyber Operations Brigadier General Campaign Strategy Manager Security Chief Engineer of Cyber Security Chief Information Security Officer Chief of Staff Chief Security Officer Chief Technologist and Director of Technology Chief Technology Officer of Information Technology Services Chief, SC, Current Ops CIP/COOP Program Manager Commander, 688th Information Operations Wing Computer Security Division Chief Cyber Defense Subject Matter Expert and U.S Liaison Cyber Ops - Cyber TF Cyber Security Manager Cyber Security Systems Engineer Cyber Security Technical Lead Cyber Subject Matter Expert Dean of GSOIS Defence Scientist Defense Intelligence Officer, Cyber Directorate Analysis Director Capability Development Integration Directorate Director of Human and Command Resources Director of Information Assurance Director of Intelligence and Counter-Intelligence Director of Joint Staff Director, Cyber Operations Director, Cyber Security Coordination National Protection Executive Director, Institute for Law, Science and Global Security; Consult Federal Senior Security Architect Group Leader of Cyberspace Science Research Fleet Cyber Command (FLTCYBERCOM)/Commander, IT Security Manager Joint Missions Office Director Manager for Network Defence Watch Operations Manager of Information Security Principal Network Systems Analyst Program Development Manager Science Advisor Security Specialist Senior Computer Scientist and Information Security Researcher OTHER ORGANIZATIONS IN ATTENDANCE Adobe Systems, Inc. ARCYBER/NETCOM BAE Systems Ball Aerospace & Technologies Corporation Booz Allen Hamilton Brazilian Army Carahsoft CFNOC/CORFC Cisco Systems CSG International Cyber Consequences Unit DEA Department of Energy Department of Homeland Security DND Canada DRDC Centre for Operational Research and Analysis DRS Defense Solutions Evidence Based Research FAA FBI- Cyber Division Fox IBM L-3 Communications Lockheed Martin Global Training and Logistics ManTech International Corporation MARFORCYBER MITRE NASA National Cybersecurity Center of Excellence (NCCoE) Naval Network Warfare Center NIST Northrop Grumman Information Systems NSWC Crane Office of Naval Research (ONR), Science Advisor to USN Q1 Labs Radware, Inc. Thales Norway The Naval Postgraduate School United States Naval Special Warfare Command US Air Force US Army US Dept of State US Navy US Navy Cyber Force
5 PROMOTIONAL AND ADVERTSIING OPPORTUNITIES INCLUDE: o COCKTAIL RECEPTION Branding at all drinks stations and on tables including branded drinks vouchers given to all conference delegates and quota per exhibitor/sponsor plus 5 minute welcome address o LOGO ON BADGE This high-profile opportunity is a guaranteed read and will keep or catapult your brand to front-of-mind status o BADGE LANYARD Put your logo around the necks of all attendees at the show! A great way to brand your company: a walking banner! o REGISTRATION HANDOUT We will hand out your literature at the registration counters as people enter the show to get their materials o SHOW BAG Your bags will be distributed at the show in the lobby. Everyone will be carrying your graphics around with them! o SPECIAL EVENT Sponsor a special event at the Show! Exclusive invite-only luncheons, dinners, cocktail hours, special product demonstrations, etc. are available. o WEBSITE BANNER AD Sponsor logo on rotating tiles on the registration site visited by all attendees, including links to homepage o REGISTRATION KICK PANELS Your graphics will be featured on the bottom portion of every-other registration counter right at the front of the show. o HOTEL KEYCARD Reach this audience of decision-makers, recommenders and influencers at a moment when there s little branding competition when they re entering their hotel rooms! o WELCOME BANNER Large welcome banner in the alcove of the entrance to the exhibit hall which will include the show logo and a sponsor logo o METER BOARDS (2) Your graphics will be featured on two double-sided signs that can go anywhere around the show! The signs are 3 wide and almost 8 tall. o INDOOR BANNERS Your banner would make a huge impact in the lobby of the show. Inquire for available locations. o CONFERENCE PAD & PEN Paper note pads and pens with sponsor branding given to all conference attendees o CONFERENCE SEAT DROP 1 page seat drop in the main conference room during the break, literature to be placed on the conference attendee seats
Investigate Securely Provision Operate and Maintain Collect and Operate Protect and Defend ANALYZE Oversight and Development Seven Categories of the National Cybersecurity Workforce Framework csrc.nist.gov/nice
delivering results that endure Annual Report 2009 our our vision Booz Allen Hamilton is committed to being the absolute best management and technology consulting firm, as measured by our clients success,
EXHIBITOR MARKETING KIT & SPONSORSHIP BROCHURE www.motorcoachexpo.com TABLE OF CONTENTS CONTACT INFORMATION MAXIMIZE YOUR EXPOSURE AND INCREASE THE VALUE OF YOUR INVESTMENT AT UMA MOTORCOACH EXPO 2016.
AITP Partners Program National Level The Association of Information Technology Professionals (AITP) is the leading society of information technology business professionals and the community of knowledge
Vol. 19 No. 4 2012 Building a national program for cybersecurity science Globe at a Glance According to the Experts Pointers Spinouts GUEST Editor s column Frederick R. Chang, PhD Considered by most to
2 0 1 2 N A T I O N A L Cybersecurity Innovation C O N F E R E N C E Program Guide The Baltimore Convention Center Baltimore, MD October 3-5, 2012 Co-located event with 8 T H A N N U A L IT Security Automation
MICHIGAN CYBER INITIATIVE 2015 Leading the Nation: An interagency, public-private collaboration www.michigan.gov/cybersecurity FROM THE GOVERNOR Michigan has become the leader among states in cybersecurity.
PELL CENTER REPORT for INTERNATIONAL RELATIONS and PUBLIC POLICY One Leader at a Time: The Failure to Educate Future Leaders for an Age of Persistent Cyber Threat Francesca Spidalieri March 26, 2013 Internet-based
United States Government Accountability Office Report to Congressional Committees March 2015 DEFENSE SCIENCE AND TECHNOLOGY Further DOD and DOE Actions Needed to Provide Timely Conference Decisions and
Online Collaboration Real Results Report Accelerating business with online collaboration Four case studies WebEx Communications, Inc. 3979 Freedom Circle, Santa Clara, CA 95054 USA Main: +1.408.435.7000
CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy
Cybersecurity Training Key to getting people back to work Meeting the demand for optical communications training Positioning managers for leadership and success Volume 2 Number 1 FALL 2011 Anne Arundel
In This Issue 2 Director s Message 3 Army Senior Leaders on the Move 5 Mission Installation Contracting Command Small Business Associate Director Garners Praise at Retirement Ceremony Associate Director,
Zero Day For Cyber Security Talent Summary Sponsorship Prospectus A call for supporters to undertake a cyber security labour market study for Canada Project Study Leaders Meenakshi Gupta, Senior Director,
The National Cyber Security Strategy Our Forward Plans December 2013 1 The UK Cyber Security Strategy Report on progress December 2013 Our Forward Plans Two years have passed since we first set out our
BUILD YOUR BRAND AT DESIGNBUILD SPONSORSHIP OPPORTUNITIES 28 30 APRIL 2015 SYDNEY SHOWGROUND, SYDNEY OLYMPIC PARK BUILT FOR OUR INDUSTRY. DESIGNBUILD Date: 28-30 April 2015 Location: Sydney Showground,
PLAN YOUR MARKETING FOR IWF 2015-2016 MARKETING OPPORTUNITIES 2016 August 24-27, 2016 International Woodworking Fair, LLC is owned and sponsored by Dear IWF 2016 Exhibitor, We always strive to bring the
A Human Capital Crisis in Cybersecurity Technical Proficiency Matters A White Paper of the CSIS Commission on Cybersecurity for the 44th Presidency cochairs Representative James R. Langevin Representative
Report of the Cyber Security Task Force to the University System of Maryland, May 2011 rm biometrics iques protect e-mail sector hub techniques global engineering metrics act data see assess alias illegal
CYBERSECURITY WORKFORCE Getting in Front of the Cybersecurity Talent Crisis http://boozallen.tumblr.com/post/120784624298/ how-to-build-a-cyber-dream-team-when-it-comes-to CONTENTS INTRODUCTION Introduction...
SOUTH DAKOTA BOARD OF REGENTS Full Board AGENDA ITEM: 26 1 (a) DATE: April 2-3, 2014 ****************************************************************************** SUBJECT: New Program: DSU D.Sc. in Cyber
Awareness and Outreach Task Force Report to the National Cyber Security Partnership March 18, 2004 Executive Summary About the Task Force The Awareness and Outreach Task Force, an industry-led coalition
Transforming the Way Government Builds Solutions > ACT-IAC Institute for Innovation 2013 American)Council)for)Technology Industry)Advisory)Council:)) The American Council for Technology (ACT) is a non-profit
How to Get Hired for a Cybersecurity Internship by Wilton Jowett Introduction This guide provides information relevant to those seeking an internship in the cybersecurity field. The first section covers
a report of the csis technology and public policy program Updating U.S. Federal Cybersecurity Policy and Guidance spending scarce taxpayer dollars on security programs that work Authors Franklin S. Reeder
Script The May 2015 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST UK Cyber Security: The role of insurance ALSO INSIDE Update from Ian Glover Record numbers at Congress 2015 A review of CRESTCon Congress
Las Vegas January 12-14, 2015 The Venetian Las Vegas Sponsorship and Marketing Promotional Opportunities Bob Kennedy, Sponsorship Sales Manager Tel: +1 763-445-3517 Fax: +1 763-322-9004 Email: firstname.lastname@example.org