BECOME AN EXHIBITOR
The DoDIIS Worldwide Conference provides a one-of-a-kind opportunity to collaborate, network and forge relationships with like-minded government and industry leaders. Rarely are so many heads of agencies, cabinet officials, top military & civilian personnel, and industry members gathered under one roof to showcase and discuss creative solutions.
The conference will feature a comprehensive selection of sessions focusing on integration across the Intelligence Community and rapidly developing and deploying mission-focused solutions, allowing participants to interact with and showcase solutions to a broad range of IC, DoD, and industry leaders about the issues impacting the mission user.
EXPECTED ATTENDANCE: 2,000+
2019 DoDIIS ATTENDEE COMPOSITION
GOVERNMENT ATTENDEE BREAKDOWN
ATTENDEE DEMOGRAPHICS
Attendees come from 4 different countries and 42 different states
Over 400 different government organizations are represented
46% of conference registrants opt in to share their contact information on a list for event sponsors
74% of the Attendees spent two or more hours of their conference experience inside the exhibit hall
97% of the Attendees said that they spent time networking with the exhibitors during the conference
74% of the Government Attendees are in decision making leadership positions
PARTICIPATING ORGANIZATIONS:
- 1 ACOS
- 12th Air Force – Air Forces Southern
- 16th Air Force – Air Forces Cyber
- 17th Training Wing
- 352nd Civil Affairs Command
- 363rd ISR Wing
- 39th IOS Cyber Intelligence Formal Training Unit
- 402nd Software Maintenance Group
- 412th Test Wing
- 45th Space Communications Squadron
- 480th ISR Wing
- 505th Command and Control Wing/505 TRS
- 513th MI Brigade
- 53rd Wing/Eglin Air Force Base
- 548th ISR Wing
- 559th Software Maintenance Squadron
- 577th Software Maintenance Squadron
- 5th Combat Communications Group
- 601st Air Operations Center
- 625 ACOMS
- 694th ISR Group
- 6th Communications Squadron
- 75th Innovation Command USAR
- 782nd MI BN
- 7th Signal Command
- 91st Cyber Brigade
- 96th Civil Engineer Group
- 96th Cyberspace Test Group
- Air Combat Command
- Air Education Training Command (AETC)
- Air Force Cryptologic and Cyber Systems Division
- Air Force Distributed Common Ground System (AF DCGS)
- Air Force Global Strike Command
- Air Force Joint Worldwide Intelligence Communications System (AF JWICS)
- Air Force Life Cycle Management Center
- Air Force Material Command
- Air Force Networking Integration Center
- Air Force Nuclear Weapons Center
- Air Force Operational Test & Evaluation Center
- Air Force Personnel Center
- Air Force Research Laboratory
- Air Force Reserve Command
- Air Force Special Operations Command
- Air Force Technical Applications Center
- Air Mobility Command
- Air National Guard
- Argonne National Laboratory
- Army CCDC Aviation & Missile Center
- Army Corps of Engineers
- Army Counterintelligence Center
- Army Futures Command
- Army G-2
- Army Geospatial Center
- Army National Guard
- Army Reserve Cyber Operations Group
- Australian Defence Force
- Battle Management Directorate
- Canadian Department of National Defence
- Centers for Disease Control and Prevention
- Central Intelligence Agency
- Chief of Naval Operation
- Coast Guard Cyber Command
- Coast Guard Maritime Intelligence Fusion Center Pacific
- Combatant Command Intelligence Enterprise Management Support Office
- Command, Control, and Communications Engineering Center
- Command, Control, Communications and Computers (C4) and Information Infrastructure Capabilities (IIC)
- Defense Advanced Research Projects Agency (DARPA)
- Defense Contract Management Agency
- Defense Counterintelligence and Security Agency (DCSA)
- Defense Intelligence Agency
- Intelligence Integration Office
- Joint Deployable Intelligence Support Systems (JDISS)
- Joint Intelligence Operations Center (JIOC)
- Joint Interoperability Test Command (JITC)
- Joint Personnel Recovery Agency
- Joint Special Operations Command (JSOC)
- Joint Warfare Analysis Center (JWAC)
- Los Alamos National Laboratory
- Marine Corps Forces, Pacific
- Marine Corps Forces Special Operations Command
- Marine Corps Intelligence Activity
- Marine Corps Intelligence Department
- Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise
- Marine Forces Central Command
- Marine Forces Command
- Military Intelligence Readiness Command
- Missile Defense Agency
- National Aeronautics and Space Administration (NASA)
- National Air and Space Intelligence Center (NASIC)
- National Assessment Group
- National Center for Medical Intelligence
- National Counterterrorism Center (NCTC)
- National Gateway Center Fort Detrick
- National Geospatial-Intelligence Agency (NGA)
- National Ground Intelligence Center (NGIC)
- National Guard Bureau (NGB)
- National Intelligence University
- National Maritime Intelligence Center
- National Maritime Intelligence-Integration Office
- National Media Exploitation Center
- National Reconnaissance Office (NRO)
- National Security Agency (NSA)
- National Space Defense Center
- Naval Air Systems Command
- Naval Air Warfare Center Training Systems Division
- Naval Criminal Investigative Service (NCIS)
- Naval Cyber Defense Operations Command
- Naval Information Warfare Center Atlantic
- Naval Information Warfare Center Pacific
- Naval Information Warfare Systems Command
- Naval Oceanographic Office
- Naval Special Warfare Command
- Program Executive Office Command, Control, Communications, Computers and Intelligence
- Program Executive Office for Enterprise Information Systems
- Program Executive Office for Intelligence, Electronic Warfare and Sensors
- Project Kessel Run
- Research and Development Support Activity
- Sandia National Laboratories
- Space and Missile Systems Center
- Special Operations Command Central
- Special Operations Command North
- Special Operations Command South
- The MITRE Corporation
- Unified Cross Domain Management Office (UCDMO)
- United Kingdom Joint Forces Command
- United Kingdom Ministry of Defence
- US Africa Command (AFRICOM)
- US Air Force Warfare Center
- US Air Forces in Europe-Air Forces Africa (USAFE-AFAFRICA)
- US Army Cyber Command
- US Army Europe (USAREUR)
- US Army Forces Command (FORSCOM)
- US Army North
- US Army South
- US Army Space and Missile Defense Command
- US Army Special Operations Command
- US Central Command (USCENTCOM)
- US Coast Guard Intelligence (CG-2)
- US Coast Guard Maritime Intelligence Fusion Center Atlantic (MIFC LANT)
- US Coast Guard Office of Cyberspace Forces
- US Coast Guard Pacific Area
- US Coast Guard Research & Development Center
- US Customs and Border Protection
- US Cyber Command (USCYBERCOM)
- US Defense Digital Service (DDS)
- US European Command (USEUCOM)
- US House of Representatives Permanent Select Committee on Intelligence (HPSCI)
- US Indo-Pacific Command (USINDOPACOM)
- US Marine Corps Forces Cyberspace Command
- US Military Entrance Processing Command
- US Naval Forces Central Command
- US Northern Command (USNORTHCOM)
- US Southern Command (USSOUTHCOM)
- US Space Force (USSF)
- US Special Operations Command (USSOCOM)
- US Strategic Command (USSTRATCOM)
- US Transportation Command (USTRANSCOM)
- XVIII Airborne Corps
PROFESSIONAL TITLES OF ATTENDEES:
- Analyst
- Branch Chief
- Business Relationship Manager
- Chief
- Chief Data Officer
- Chief Information Officer (CIO)
- Chief Information Security Officer (CISO)
- Chief of Staff
- Commanding Officer
- Computer Engineer
- Computer Scientist
- Contracting Officer
- Chief Technology Officer (CTO)
- Cyber Security Specialist
- Cyber Operator
- Data Scientist
- Data Engineer
- Department Head
- Deputy Director
- Developer
- Director
- Division Chief
- Electronics Engineer
- Engineer
- Enterprise Architect
- Information Assurance Manager/Officer
- Information Security Specialist
- Information Systems Security Manager/Officer (ISSM/ISSO)
- Innovation Officer
- Intelligence Analyst
- Intelligence Operations Specialist
- Network Administrator
- Network Analyst
- Network Engineer
- Operations Director
- Program Manager
- Project Manager
- Requirements Manager
- Scientist
- Section Chief
- Security Controls Assessor
- Security Engineer
- Senior Intel Officer
- Senior Systems Administrator
- Senior Technical Advisor
- Senior Systems Engineer
- Software Engineer
- System Administrator
- Technical Director
- Unit Chief
The most valuable thing to me was networking with industry and seeing the capabilities first-hand in one place. I had the time and space to really dig into the particulars of what vendors had to offer. Saves me a ton of time when I’m trying to identify capabilities needed for mission.
-DoDIIS 2019 Attendee
EXHIBITOR DEMOGRAPHICS
Exhibit floor expected to sell out with over 350 Booths
57% of exhibitors compliment their booth with a sponsorship
First-time exhibitors made up 27% of the companies at DoDIIS with 42% also doing sponsorship to increase their branding and networking opportunities
50+ Product/Service categories are represented
75% of exhibitors said they had great conversations and got the opportunity to meet with key government personnel
92% of exhibitors had a positive experience and will participate again
PAST EXHIBITORS:
- 22nd Century Technologies
- A10 Networks
- ABSc
- Accellion
- Accenture
- AccessData
- ActioNet
- Activu
- Adamo Construction
- Adobe
- Adorama
- Advanced Design Corp.
- Advanced Programs, Inc.
- Advatech Pacific, Inc.
- AECOM
- AEEC (American Consultants)
- Aerstone Labs
- Agile Empowerment Technologies
- AgileCraft
- Air Force Research Laboratory
- Air Force Technical Applications Center
- Airbus Defense & Space Government Solutions, Inc.
- Alamo City Engineering Services
- Alfo Software
- Allied Telesisresc
- Amazon Web Services
- AMERICAN SYSTEMS
- ANACAPA Micro Products
- Anomali
- APCON, Inc.
- Apigee
- Appian Corporation
- Apple
- Applied Network Solutions
- Apposite Technologies
- Apriva ISS
- Arbor Networks
- Arista Networks
- Armag Corporation
- Arnouse Digital Devices Corp
- Aruba Networks, a Hewlett Packard Enterprise
- Aspera, an IBM Company
- Assurance Data, Inc
- Assured Information Security
- AT&T
- Atlantic Media/Defense One
- Atlantis Computing
- Atlassian
- Attivo Networks
- August Schell
- Authentic8
- Automation Anywhere, Inc.
- Avaya Government Solutions
- Avere Systems
- Axiologic Solutions, LLC
- Axway
- Ayon Cyber Security
- Babel Street
- BAE Systems, Inc.
- Ball Aerospace
- Basis Technology
- Bastille
- Becrypt Limited
- Berico Technologies, LLC
- BeyondTrust Federal
- Big Switch Networks
- Blue Canopy Group, LLC
- Blue Coat Systems
- Blue Prism
- BlueCat Networks
- BluVector, a Comcast Company
- BMC Software
- Boeing
- Booz Allen Hamilton
- Boundless Spatial
- Box, Inc.
- Brainspace, a Cyxtera Business
- Bricata
- Broadcom Inc.
- Brocade Communications Systems, Inc.
- Bromium, Inc.
- C3 IoT
- C4ISR Journal
- CA Technologies
- CACI International, Inc.
- Cambridge Intelligence, Ltd
- Capitol Technology University
- Carahsoft
- Carnegie Mellon University Software Engineering Institute CERT Division
- CDW-G, LLC
- Centrify Corporation
- CenturyLink
- Chainalysis
- Chef IO
- CIS Secure Computing, Inc.
- Cisco Systems, Inc.
- ClearShark
- Cloudera Government Solutions, Inc.
- Cloudian
- cloudtamer.io
- Code42 Software, Inc.
- Cognitive SaaS for the IC
- Cohesity
- CollabNet
- CommScope, Inc.
- Commvault
- ComplyUp
- Computable Insights
- Confluent, Inc.
- Core Security
- Corelight
- Corning Optical Communications
- Corporate Office Properties Trust (COPT)
- cPacket Networks Inc.
- Cray, Inc.
- Crestron Electronics, Inc.
- Criterion Systems
- Cross Match Technologies
- CrowdStrike
- CRU Acquisition Group, LLC
- Crunchy Data Solutions
- Crystal Group Inc.
- CSRA, LLC
- CTERA Networks
- CTG, Inc. (CTGi)
- Cubic Cyber Solutions
- Cubic Mission Solutions
- Cutting Edge CA
- CyberArk
- Cyberbit
- CyberCore Technologies
- Cylance
- Cyxtera
- Data Security, Inc.
- Dataminr
- DataRobot
- DataWalk
- Datawatch
- Datrium
- Decipher Technology Studios
- Decision Lens
- Defense Intelligence Agency (DIA)
- Dell EMC
- Deloitte
- Delphix
- Dexter Edward, LLC
- Diffeo
- Digital Element
- Digital Guardian
- Digital Reasoning Systems
- Digital Trends, Inc.
- DLT Solutions
- DP Facilities, Inc.
- Dun & Bradstreet
- Dynamic Systems, Inc.
- Eagle Ray, Inc.
- Eagle Technology Group
- Eclipse
- EDT, LLC (Dead on Demand)
- Elasticsearch Inc.
- EMC Corporation
- Emcon Emanation Control Ltd.
- Emerson Network Power
- Endgame
- Engility Corporation
- En-Net Services
- Entrinsik
- Envistacom
- Epiq Solutions
- Equinix Government Solutions
- Esri
- Eutelsat America Corp
- Enterprise Ventures Corporation
- EvertzAV
- Evident.io
- E-volve Technology Systems
- Exabeam
- ExaGrid
- Extenua, Inc.
- Extron Electronics
- F5 Networks, Inc.
- FCN Technology Solutions, Inc.
- Federated IT
- FEDITC, LLC
- Feith Systems and Software, Inc.
- Fidelis Cybersecurity
- Finch Computing
- FireEye
- FireMon
- Forcepoint
- ForeScout Technologies Inc
- Fortinet Federal
- Forward Networks
- Frame
- Fraym
- Freedom Consulting Group
- Fulcrum IT Services
- General Dynamics
- General Dynamics Information Technology
- Geofeedia
- Germane Systems
- GigaBiter LLC
- Gigamon
- GitLab
- Glasswall Government Solutions
- Global Knowledge
- Globalscape
- Good Technology
- GovChat
- Graphite Software Corporation
- Graybar
- GreenTec-USA
- GSA FEDSIM
- Guidepoint Security LLC
- Gurucul
- HackerOne
- HARMAN
- Haystax Technology
- Hewlett Packard Enterprise
- Hexagon Metrology, Inc.
- HGST
- Hitachi Data Systems Federal
- Hitachi Vantara Federal
- Hootsuite
- Hortonworks
- HumanGeo
- HVF Precious Metals LLC
- Hypori
- HyTrust
- i3solutions
- IAA
- IBM
- ICES
- IEEE Xplore Digital Library
- Illumio
- iMerit
- immixGroup
- IMSM, Inc.
- Infoblox Federal
- Informatica Federal Operations
- Inpixon
- Intellectual Point
- Intelligent Decisions, Inc.
- Intelligent Software Solutions
- Intelligent Waves
- IntelliPeak Solutions, Inc.
- Intelsat General Corporation
- Invictus
- IPSecure, Inc.
- iSenpai
- ISSTSPi
- IT Concepts, Inc
- IT Veterans, LLC
- JDISS
- Jive Software
- Juniper Networks
- K2
- Kapow Software
- KeyW
- Kforce Government Solutions
- Koto
- KPMG
- L-3
- Lambda
- LANDESK
- Leidos, Inc
- LexisNexis
- Lexmark International
- LizardTech
- Lockheed Martin
- LogRhythm
- Lookout
- Lynx Software Technologies
- Magnet Forensics
- ManTech International Corporation
- Mantis Security
- Mapbox, Inc.
- MapLarge
- MarkLogic
- McAfee
- MDA Information Systems LLC
- MEGA International
- MemSQL
- Mercom Corporation
- Mesosphere
- Metric Insights
- Micro Focus
- Micron Technology, Inc.
- Microsoft
- MicroStrategy
- Modus Operandi, Inc.
- MongoDB
- Motorola Solutions
- Mulesoft
- MyComputerCareer
- Mythics, Inc.
- Napatech, Inc.
- NASA SEWP
- National Geospatial-Intelligence Agency (NGA)
- National Security Agency (NSA)
- NCS Technologies, Inc.
- Neo4j, Inc.
- NetApp
- NetBrain Technologies, Inc.
- Netlocity VA, Inc.
- NETSCOUT Systems
- Network Runners
- New Horizons Computer Learning Centers
- New River Systems Corporation
- Newbrook Solutions
- NIH NITAAC
- NIKSUN
- Nimbus Data
- NITAAC
- Northrop Grumman
- Norwich University
- Novetta
- NRESP/NRO
- NSA IC ITE
- Ntrepid
- Nuix USG Inc.
- Nutanix, Inc.
- NuWave Solutions
- Nuxeo
- Occam Solutions, Inc.
- Office of Naval Intelligence (ONI)
- Omnibond Systems, LLC
- One Identity
- Oneida Technical Solutions, LLC
- OpenText Inc.
- OPSWAT
- Oracle Cloud
- Oracle National Security Group
- Orbital Insight
- OSIsoft
- OutSystems
- Owl Cyber Defense Solutions
- Packet Design Inc.
- Palantir Technologies
- Palmer’s Security Solutions
- Panasas, Inc.
- PCMG
- Pearson VUE
- Penguin Computing
- Peraton
- Percipient.ai
- Perfecta Federal
- PernixData
- Persistent Systems
- PESA
- Pexip
- PFP Cybersecurity
- Phoenix TS
- Pivotal
- PKWARE
- Planar Systems, Inc. a Leyard Company
- PointSec Mobile Technologies/Checkpoint
- Polaris Alpha
- Polycom, Inc.
- Portexa, LLC
- PricewaterhouseCoopers (PwC)
- Primer
- PrinterLogic
- Parsons
- Proofpoint
- Provalis Research
- PTFS
- Pure Storage
- Qadium
- Qlik
- QTS Datacenters
- Qualys, Inc.
- Quantum Corporation
- Quark Software Inc.
- Quest
- Quiet Professionals, LLC
- Radware, Inc.
- Raritan
- Raytheon BBN Technologies
- Raytheon Secure Information Systems
- Recorded Future
- Red Arch
- Red Hat, Inc.
- Red River
- Ribbon Communications
- Riverbed Technology
- RSA, The Security Division of EMC
- Rubrik Federal
- SafeNet Assured Technologies,
- SAIC
- SAP NS2
- SAS Federal LLC
- SC2 Corp
- Scientific Research Corporation
- SDL Government
- SeaGate Government Solutions
- Sealing Technologies, Inc.
- Search Technologies
- SecureAuth
- SecureNinja
- Security Engineered Machinery
- Securonix
- Server Technology
- ServiceNow
- SES Government Solutions
- Shavlik Technologies
- Signals Defense
- Sipi Metals
- Skyhigh Networks
- SMS Data Products Group
- Solace
- SolarWinds
- Sonatype
- Sotera Defense Solutions
- SoundWay Consulting
- Spire Global
- Splunk
- Star Communications, Inc
- SteelCloud
- Sterling Computers Corporation
- StorageHawk
- Street Legal
- SUSE
- SwiftStack
- Symantec Corporation
- Syntelligent Analytic Solutions, LLC
- Synthos Technologies
- Syracuse University
- Tableau Software
- Tanium
- TDi Technologies
- Telestrategies
- Tellabs
- Telos Corporation
- Tenable
- Teradata Corporation
- TerraGo Technologies
- Thales
- The Buffalo Group
- Themis Computer
- Thetus Corporation
- Thinklogical, A Belden Brand
- ThoughtSpot, Inc.
- ThunderCat Technology
- Thycotic
- TIBCO Software
- TigerGraph
- Tintri
- T-Mobile for Government
- T-Mobile USA Inc.
- TransUnion
- Trend Micro
- Tresys Technology, LLC
- Triad Technology Partners
- Trident Systems
- Trifacta
- Trinity Technology Partners,
- Tripwire, Inc.
- Trusted Systems
- Trustwave
- Truxton Forensics
- TVAR Solutions
- TYCHON
- U.Group
- UiPath
- Unanet
- Uncharted Software
- University of Maryland
- Vanguard LED Displays
- Varen Technologies
- Varonis Systems
- Vector Technologies, LLC
- Veeam Software
- Venafi
- Vencore Inc.
- Veritas
- Veritone
- Verizon
- Vertiv
- Viasat
- ViON Corporation
- Virtru
- Virtual Enterprise Architects
- Virtual Instruments
- Vision Solutions
- VMware
- Vormetric
- Vykin Corporation
- WANdisco
- Westin Peachtree
- Wind River
- WiSC Enterprises
- Xerox
- Yellowbrick Data
- Zenoss
- Zimbra
- ZL Technologies
- Zolon Tech, Inc.
REQUESTED TECHNOLOGIES INCLUDE:
- All-Source Intelligence
- Artificial Intelligence
- Analysis Tools
- Application Performance Monitoring
- Application Services
- Big Data Analytics
- Biometrics and Forensics
- Business Analytics
- Cloud Computing
- Cloud Providers
- Collection Tools
- Compliance Oversight
- Consulting Services
- Continuous Monitoring
- Cross Domain Solutions
- Cyber Security
- Data Analytics
- Data Destruction
- Data Protection & Management
- Encryption Solutions
- Hard Drive Sanitation Software
- Insider Threat Detection
- Knowledge Management Solutions
- Machine Learning
- Network Security
- Open Source Intelligence/OSINT
- Platform Integration
- Plug and Play Products
- Portfolio Management Tools
- Professional Support Services
- Secure Collaboration
- Secure Mobility
- Signals Intelligence/SIGINT
- Situational Awareness
- Software Engineering
- Storage Solutions
- Technical Collection
- Telecommunication Networks
- Training & Certification
- Virtual Networks
- Virtual Reality
- Visualization
- Wireless Solutions
The exhibit floor was the most impactful and important part of my time at the conference. Saved me a lot of time and helped me separate needed from “nice-to-have” capabilities in one show. The value can’t be overstated.
-DoDIIS 2019 Attendee