Open Source Intelligence (OSINT) and So...
Get a live demonstration of Social Navigator, used by government and corporations around the world to monitor social meda and open source channels for threats against people and assets. Used for threat detection, situational awareness, fraud protection, data leaks, corporate governance and executive protection. Social Navigator combs billions of posts across all major social media channels, boards, blogs, paste sites, chat rooms, deep and dark...
Import FDA in the Automated Commercial...
OVERVIEW This webinar focuses on the role of the import managers when shipping goods under the FDA and Customs Regulations. It also addresses what regulations can be used to help the importer in understanding Automated Commercial Environment (ACE) as the Sole CBP-Authorized Electronic Data Interchange (EDI) System for Processing Certain Electronic Entry and Entry Summary Filings Accompanied by Food and Drug Administration (FDA) Data. This revi...
CXO Tech Forum: A.I. in Government
Join GovernmentCIO Magazine on Dec. 14 at the House of Sweden for an evening that explores the current state of A.I. in government and its potential to change the economy, the workforce, and society writ large. The forum will feature A.I. experts in government, academia, and industry pushing the boundaries of A.I. technologies and the ways it could revolutionize government. The evening will include a networking reception at one of Washington's...
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
Ugly Christmas Sweater Cyber Smoke Pres...
It's time to kick of the Holiday Season in style with your government and industry information management and technology colleagues at the 2017 Ugly Christmas Sweater Cyber Smoke Event presented by Intelvative in partnership with AFFIRM. The 2017 Cyber Smoke Series is sponsored by Acquia, Bromium, Crowdstrike, Cylance, Cynergy, FireEye, Forescout, One Identity, Symantec, Tanium, Tenable, and Trustwave The deck at Morton's will be open to enjoy...
December 14, 2017
Organizer:
AFFIRM Location:
Washington, DC
Predictive Analytics: Failure to Launch
How to Get Analytic Modeling Off the Ground and Into Orbit The vast majority of BI professionals and big data enthusiasts are excited about the prospects of predictive analytics and data mining, but are fully mystified about where to begin or even how to prepare. Of those who did initiate a modeling initiative, an industry survey of predictive modeling practitioners reported that 51% of data mining projects either never left the ground, did no...
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
Implementation and Management of GMP Da...
OVERVIEW Data integrity is the assurance that data records are accurate, complete, intact and maintained within their original context, including their relationship to other data records. This definition applies to data recorded in electronic and paper formats or a hybrid of both. To assure the quality of raw materials, in process materials and finished goods, laboratory data integrity is assuming greater importance in current Good Manufacturi...
Best Practices in as-a-Service IT: Less...
The Space and Naval Systems Command’s mission is to deliver interoperable and secure information warfare capability by acquiring and integrating sensors, communications, weapons, information and control systems for existing and future ships, aircraft, submarines, unmanned systems and the associated shore-based support systems. The “As-a-Service” model is changing the delivery of IT modernization by providing an agile acquisit...
December 12, 2017
Organizer:
FEDINSIDER Location:
Webcast
Developer Meetup: Unlock the Value of A...
Cloud is the ideal platform for leveraging the full value of artificial intelligence and other advanced technologies. Doing so, however, requires a solid grasp of what's possible -- and a clear plan for turning the available tools and technologies into mission-enabling applications. Don't miss this opportunity to network and learn with fellow developers and AI practitioners. During this special evening meetup, you can dig into cloud-based Wats...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.