Why Sponsor?

– Increase brand awareness.
– Focused marketing and advertising campaigns.
– A dedicated website offering visibility and outreach.
– Exposure with media partners.
– Relationship building opportunities and networking opportunities with other professionals.
– A high-profile presence with direct access to thought leaders, key decision makers, and C-level executives in IT Security and Cyber Security.
– Partnering and collaborative opportunities with attendees and other sponsors.

Attendee Categories:

– Academia
– Chief Information Officers
– Chief Security Officers
– Chief Technology Officers
– Consultants
– Executive Management
– Government Officials
– Incident Management/Incident Response Professionals
– Intelligence Officials
– IT Security Professionals
– IT/IS/MIS Management
– Military Professionals
– Program / Admin Managers
– Risk Management Professionals
– System Engineers
– Technology Leaders

Exhibitor Categories:

Acoustics
Analytic Services
Analyzers
Antisubmarine Warfare
Antivirus/Worm Products
Artificial Intelligence
Automatic Target Recognition
Avionics
Batteries
Behavioral risks
Biometric Products/Services
Botnets
Broadband Services
Broadcast Equipment
C3I Systems
Client Server Technology
Cloud Compliance
Cloud Computing
Collaborative Tools
Communications Systems
Compression Technology
Computer Graphics
Computer Peripherals
Computers/Casing
Consulting
Countermeasures
Cryptographic Products
Cybercrime
Data breaches
Data Communications
Data mining
Data Storage
Detection/Identification
Direction Finding
Display Systems
Electronic Cameras
Electronic Support Measurement
Electronic Warfare Systems
Electro-Optics
ELF/VLF/LF Systems
Encryption
Engineering & Technical Systems
Fiber Optics
Firewalls
Fraud detection
Frequency Hopping
Geographic Information Systems
Global Positioning System
Headsets/Handsets
HF Radio

Homeland Security
Identity theft
Imaging
Information Assurance
Information Management
Information Security
Infrared Equipment
Infrastructure Security
Instrumentation
Intelligence Support Systems
Intelligent Networks
Intrusion Detection
Lasers
Message Systems
Microelectronics
Microwave Products/Systems
Mission Planning
Mobile Communications
Mobile security
Modeling/Simulation
Multichannel Radios
Multimedia Systems
Multiplexers
Navigation/Guidance Systems
Network Management
Network risks
Networking Technologies
Night Vision Systems
Online fraud
Open Systems
Optical Disks/Storage
Passive EW Systems
Password Protection
PCI Compliance
Photonics
Port Scanners
Power/Energy
Public Key Infrastructure
Radio Direction Finding
Radio Monitoring Systems
Radio Receivers
Recording Devices
Remote Radio Controls
Remote Sensing
Repair Equipment/Services
Risk Management
Satellite Communications
Satellite Payloads
Scramblers
Scripting

Secure Communications
Security Assessments
Security Assessments
Security Devices
Security investment
Security Management
Sensors
Shielding
SIEM
Signal Analysis
Signal Processing Systems
Signature validation
Smart Cards & Services
Social networking
Software Engineering
Space Communications
Space Operations
Spectrum Analysis
Speech Processing
Strategic C2 Systems
Strategic Planning
Super/Strategic Computing
Surveillance Systems
Systems Integration
Tactical C2 Systems
Telecom Equipment/Service
Telecom System Design/Engineering
Teleconferencing
Telemetry Devices
Telephone Equipment/Systems
Tempest Products
Threat Assessment
Tracking Systems
Transceivers
Transmitters
Troposcatter Systems
Trusted Computer Systems
Underwater Electronics
Uninterrupted Power Supply
Unmanned Systems
Vehicular Radio Systems
Video Equipment
Video Teleconferencing
Virtualization
Virtualized Identity
Vulnerability Assessment
Web applications
Web Filters
Wire/Cable
Wireless Communications