WEST 2024 Sponsorship and Branding Opportunities

AFCEA and the U.S. Naval Institute have developed an enhanced sponsorship program for WEST 2024 that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure than at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback from sea service warfighters, and where industry thought leaders will discuss and demonstrate sea service solutions? Sponsorship opportunities are offered at a several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships and Branding Opportunities.

Have an idea for a sponsorship not listed below? We are here to ensure you have the best conference experience. We are happy to create a custom sponsorship package to meet your specific needs. Let us know your vision, objective and budget and we’ll create a customized opportunity just for you.

The deadline to submit contracts and sponsor artwork is Friday, January 5th.

Thought Leadership - Learn from Key Industry Leaders

Agile Defense - SPONSOR


The Department of Defense and Federal Agencies need to prevent advanced persistent threat actors from gaining unauthorized access to their systems and infrastructure. However, this presents a contentious and continuous challenge with repetitive checks and audits. Agile Defense’s STIG automation tool offers a solid and validated solution to perform ad-hoc systems audits, remediate, and provide current state artifacts using an immutable automated approach that leverages the advantages and cost savings of automation.

Click here to read more.

Appian - Booth 2315

Rapid, Future-Ready IT Modernization in Defense Agencies

The United States Department of Defense (DoD) and related agencies are driving an across-the-board IT modernization initiative. The DoD Chief Information Officer’s vision is to create “a more secure, coordinated, seamless, transparent, and cost-effective IT architecture that transforms data into actionable information and ensures dependable mission execution in the face of a persistent cyber threat.” The US Army, for one, is leveraging their adoption of cloud, artificial intelligence (AI), and data analytics to form the IT backbone of their modernization initiatives across weapons, personnel, and strategy.

Click here to read more.

Appian - Booth 2315

3 Steps to Efficient Government Workflows with Low-Code

Modernizing government technology is an imperative for federal, state, and local departments alike. Gartner predicts that by 2025, more than half of government agencies will have modernized critical core legacy applications to improve resilience and agility.1 But upgrading core technology can be daunting. A common misconception among government organizations is that modernizing technology requires removing incumbent solutions that have been in place for years. That’s not the case.

Click here to read more.

BMC - Booth 2140

Harnessing the Power of AI Across Service and Operations Management

Operations teams face many difficult challenges. They are overwhelmed with increasingly large amounts of complex data from multiple sources, and event noise hides problems that need to be solved quickly. Using artificial intelligence for IT service management (AISM) and artificial intelligence for IT operations (AIOps) is a paradigm shift that enable machines to solve IT issues without human assistance.

Click here to read more.

Deloitte - Booth 1221


The movement towards connected control systems to increase automation, speed, and ease of operations is a pervasive reality that will continue to expand into every industry. Control systems are prevalent in critical infrastructure such as power grids down through local municipal water pump stations and up through military platforms on land, sea and air. Securing these connected control systems against today's sophisticated and emboldened hackers has never been more important as many of the systems were originally built for ease of use and operations, as many systems were built prior to and without anticipating modern threats.

Click here to read more.