Table of contents
  1. Story
  2. Slides
    1. TIBCO
      1. Slide 1 Big Data Solutions for US Federal Government
      2. Slide 2 Vivek Ranadive TIBCO CEO
      3. Slide 3 How the "Two Second Advantage" Works Together for DHS
      4. Slide 4 Your IT Infrastructure 1
      5. Slide 5 Your IT Infrastructure 2
      6. Slide 6 Event Enabled Enterprise
      7. Slide 7 Government Track Record
      8. Slide 8 TIBCO in the Federal Government
      9. Slide 9 TIBCO and Big Data
      10. Slide 10 More Complexity
      11. Slide 11 Big Data
      12. Slide 12 Extreme Information
      13. Slide 13 Data in Motion Close the Loop
      14. Slide 14 Why Close the Loop?
      15. Slide 15 Real Time Events
      16. Slide 16 Information Flow for Real-time Intelligence Processing
      17. Slide 17 Case in Point: A Healthcare Organization 1
      18. Slide 18 Case in Point: A Healthcare Organization 2
      19. Slide 19 Spotfire Big Data Analytics
      20. Slide 20 Spotfire and Proctor & Gamble
      21. Slide 21 System Requirements
      22. Slide 22 Spotfire & Big Data: How it's Done
      23. Slide 23 Beyond In-Memory: In-database Analytics
      24. Slide 24 Volume: Spotfire + Teradata
      25. Slide 25 A Hybrid Approach: Data on Demand
      26. Slide 26 Spotfire & ADS: Hadoop as an Example
      27. Slide 27 Spotfire & Composite Information Server
      28. Slide 28 Spotfire Advanced Data Services - Other Big Data Sources
      29. Slide 29 Spotfire & Extreme Information
      30. Slide 30 Spotfire Statistics Services
      31. Slide 31 Spotfire's Predictive Analytics Ecosystem
      32. Slide 32 Summary
      33. Slide 33 Spotfire Value Drivers
      34. Slide 34 Closing the Loop
      35. Slide 35 2-Second Advantage 1
      36. Slide 36 2-Second Advantage 2
  3. Spotfire Dashboard
  4. Research Notes
  5. Keynotes
    1. KN-1 Creating Business Cases, Re‐engineering Processes, and Driving Results
      1. Paul Brubaker
      2. Mark Day
      3. Mark Forman, Moderator
      4. Keith Trippie
  6. Spotlight Sessions
    1. SS1-1 Harnessing Big Data for Identity Intelligence
      1. Rex Keith
    2. SS1-2 Applying Fraud Lessons from the Financial Sector to Program Integrity
      1. Andy Smith
    3. SS1-3 Big Data in Motion
      1. Atif Chaughtai
  7. Technology Roundtable Program
    1. Table #17: Fighting the Invisible Enemy Using Predictive Analytics
      1. Facilitator: Nimish Rawal, Principal Solutions Consultant, TIBCO
    2. Table #17: The Power of Big Data: 3 Things to Consider When Selecting a Big Data Solution
      1. Facilitator: Rick Jenkins, Sr. Solutions Consultant, TIBCO
  8. Government IT Forum Kicks Off Training; Conference and Expo Tuesday
  9. Presentations
    1. Cloud & Virtualization Sessions
      1. Emerging Trends: How to Take Advantage of IT as a Service Model
      2. Cloud Confidence from a US Government Information Security Professional’s Perspective
      3. Automation, Brokering, and the Cloud
    2. Cybersecurity Sessions
      1. Internal vs. External Threats: Reducing the Risks
      2. Self-Learning Predictive Analysis of Web Threats Using Behavioral Modeling Techniques
      3. Network Security: It’s What You Can’t See That Will Sink You
      4. FedRAMP/ATO Update
      5. Continuous Reauthorization: Bridging the Gap Between FISMA and Continuous Monitoring
    3. Mobile Government Sessions
      1. Policy vs. Reality - Current Platforms Are Moving Faster than Agencies
      2. Creating a Mobile and Flexible Government
    4. Big Data & Business Intelligence Sessions
      1. Bridging the Gap Between Commodity IT and Mission IT
      2. Big Data – Veracity Completes the Puzzle
    5. Records & Information Management Sessions
      1. Unifying and Evolving Records and Information Management within a Large Federal Agency
      2. Year One of the Managing Government Records Directive
      3. In Search of Automated Electronic Records Management Solutions: Goal A3 of the Managing Government Records Directive
    6.  Future Government Technology Leaders
      1. Moving from Rising Star to Leader: Mentoring, Networking and Social Media
      2. Generational Differences and How to Overcome Them: Pros/Cons of Alternate Work Sites and Gamification
    7. Spotlight Sessions
      1. Appian: Making Innovation Rapid and Cost-Effective
      2. BeyondTrust: The Challenges and Real World Results of Automating STIG Compliance with SCAP Assessment Solutions
      3. BlueCat: Security Intelligence for Today's Network
      4. Brocade: Optimizing the Federal Data Center
      5. CA Technologies: Using Mobile Devices as a Derived Credential - A Software Strategy
      6. Centrify: Samsung KNOX for Federal Explained
      7. CommVault: Management: Becoming Data Driven in a World of Big Data and Cloud Computing
      8. Equifax: Harnessing Big Data for Identity Intelligence
      9. Equifax: Applying Fraud Lessons from the Financial Sector to Program Integrity
      10. GovPlace: Lowest Price, Technically Superior
      11. Fusion-io: Increasing Performance While Decreasing the Footprint of NoSQL Using ioMemory
      12. Panzura: Accelerating the Deployment of Your Cloud Vision
      13. TIBCO: Big Data in Motion
  10. NEXT

A 1105 Media Government IT Forum

Last modified
Table of contents
  1. Story
  2. Slides
    1. TIBCO
      1. Slide 1 Big Data Solutions for US Federal Government
      2. Slide 2 Vivek Ranadive TIBCO CEO
      3. Slide 3 How the "Two Second Advantage" Works Together for DHS
      4. Slide 4 Your IT Infrastructure 1
      5. Slide 5 Your IT Infrastructure 2
      6. Slide 6 Event Enabled Enterprise
      7. Slide 7 Government Track Record
      8. Slide 8 TIBCO in the Federal Government
      9. Slide 9 TIBCO and Big Data
      10. Slide 10 More Complexity
      11. Slide 11 Big Data
      12. Slide 12 Extreme Information
      13. Slide 13 Data in Motion Close the Loop
      14. Slide 14 Why Close the Loop?
      15. Slide 15 Real Time Events
      16. Slide 16 Information Flow for Real-time Intelligence Processing
      17. Slide 17 Case in Point: A Healthcare Organization 1
      18. Slide 18 Case in Point: A Healthcare Organization 2
      19. Slide 19 Spotfire Big Data Analytics
      20. Slide 20 Spotfire and Proctor & Gamble
      21. Slide 21 System Requirements
      22. Slide 22 Spotfire & Big Data: How it's Done
      23. Slide 23 Beyond In-Memory: In-database Analytics
      24. Slide 24 Volume: Spotfire + Teradata
      25. Slide 25 A Hybrid Approach: Data on Demand
      26. Slide 26 Spotfire & ADS: Hadoop as an Example
      27. Slide 27 Spotfire & Composite Information Server
      28. Slide 28 Spotfire Advanced Data Services - Other Big Data Sources
      29. Slide 29 Spotfire & Extreme Information
      30. Slide 30 Spotfire Statistics Services
      31. Slide 31 Spotfire's Predictive Analytics Ecosystem
      32. Slide 32 Summary
      33. Slide 33 Spotfire Value Drivers
      34. Slide 34 Closing the Loop
      35. Slide 35 2-Second Advantage 1
      36. Slide 36 2-Second Advantage 2
  3. Spotfire Dashboard
  4. Research Notes
  5. Keynotes
    1. KN-1 Creating Business Cases, Re‐engineering Processes, and Driving Results
      1. Paul Brubaker
      2. Mark Day
      3. Mark Forman, Moderator
      4. Keith Trippie
  6. Spotlight Sessions
    1. SS1-1 Harnessing Big Data for Identity Intelligence
      1. Rex Keith
    2. SS1-2 Applying Fraud Lessons from the Financial Sector to Program Integrity
      1. Andy Smith
    3. SS1-3 Big Data in Motion
      1. Atif Chaughtai
  7. Technology Roundtable Program
    1. Table #17: Fighting the Invisible Enemy Using Predictive Analytics
      1. Facilitator: Nimish Rawal, Principal Solutions Consultant, TIBCO
    2. Table #17: The Power of Big Data: 3 Things to Consider When Selecting a Big Data Solution
      1. Facilitator: Rick Jenkins, Sr. Solutions Consultant, TIBCO
  8. Government IT Forum Kicks Off Training; Conference and Expo Tuesday
  9. Presentations
    1. Cloud & Virtualization Sessions
      1. Emerging Trends: How to Take Advantage of IT as a Service Model
      2. Cloud Confidence from a US Government Information Security Professional’s Perspective
      3. Automation, Brokering, and the Cloud
    2. Cybersecurity Sessions
      1. Internal vs. External Threats: Reducing the Risks
      2. Self-Learning Predictive Analysis of Web Threats Using Behavioral Modeling Techniques
      3. Network Security: It’s What You Can’t See That Will Sink You
      4. FedRAMP/ATO Update
      5. Continuous Reauthorization: Bridging the Gap Between FISMA and Continuous Monitoring
    3. Mobile Government Sessions
      1. Policy vs. Reality - Current Platforms Are Moving Faster than Agencies
      2. Creating a Mobile and Flexible Government
    4. Big Data & Business Intelligence Sessions
      1. Bridging the Gap Between Commodity IT and Mission IT
      2. Big Data – Veracity Completes the Puzzle
    5. Records & Information Management Sessions
      1. Unifying and Evolving Records and Information Management within a Large Federal Agency
      2. Year One of the Managing Government Records Directive
      3. In Search of Automated Electronic Records Management Solutions: Goal A3 of the Managing Government Records Directive
    6.  Future Government Technology Leaders
      1. Moving from Rising Star to Leader: Mentoring, Networking and Social Media
      2. Generational Differences and How to Overcome Them: Pros/Cons of Alternate Work Sites and Gamification
    7. Spotlight Sessions
      1. Appian: Making Innovation Rapid and Cost-Effective
      2. BeyondTrust: The Challenges and Real World Results of Automating STIG Compliance with SCAP Assessment Solutions
      3. BlueCat: Security Intelligence for Today's Network
      4. Brocade: Optimizing the Federal Data Center
      5. CA Technologies: Using Mobile Devices as a Derived Credential - A Software Strategy
      6. Centrify: Samsung KNOX for Federal Explained
      7. CommVault: Management: Becoming Data Driven in a World of Big Data and Cloud Computing
      8. Equifax: Harnessing Big Data for Identity Intelligence
      9. Equifax: Applying Fraud Lessons from the Financial Sector to Program Integrity
      10. GovPlace: Lowest Price, Technically Superior
      11. Fusion-io: Increasing Performance While Decreasing the Footprint of NoSQL Using ioMemory
      12. Panzura: Accelerating the Deployment of Your Cloud Vision
      13. TIBCO: Big Data in Motion
  10. NEXT

  1. Story
  2. Slides
    1. TIBCO
      1. Slide 1 Big Data Solutions for US Federal Government
      2. Slide 2 Vivek Ranadive TIBCO CEO
      3. Slide 3 How the "Two Second Advantage" Works Together for DHS
      4. Slide 4 Your IT Infrastructure 1
      5. Slide 5 Your IT Infrastructure 2
      6. Slide 6 Event Enabled Enterprise
      7. Slide 7 Government Track Record
      8. Slide 8 TIBCO in the Federal Government
      9. Slide 9 TIBCO and Big Data
      10. Slide 10 More Complexity
      11. Slide 11 Big Data
      12. Slide 12 Extreme Information
      13. Slide 13 Data in Motion Close the Loop
      14. Slide 14 Why Close the Loop?
      15. Slide 15 Real Time Events
      16. Slide 16 Information Flow for Real-time Intelligence Processing
      17. Slide 17 Case in Point: A Healthcare Organization 1
      18. Slide 18 Case in Point: A Healthcare Organization 2
      19. Slide 19 Spotfire Big Data Analytics
      20. Slide 20 Spotfire and Proctor & Gamble
      21. Slide 21 System Requirements
      22. Slide 22 Spotfire & Big Data: How it's Done
      23. Slide 23 Beyond In-Memory: In-database Analytics
      24. Slide 24 Volume: Spotfire + Teradata
      25. Slide 25 A Hybrid Approach: Data on Demand
      26. Slide 26 Spotfire & ADS: Hadoop as an Example
      27. Slide 27 Spotfire & Composite Information Server
      28. Slide 28 Spotfire Advanced Data Services - Other Big Data Sources
      29. Slide 29 Spotfire & Extreme Information
      30. Slide 30 Spotfire Statistics Services
      31. Slide 31 Spotfire's Predictive Analytics Ecosystem
      32. Slide 32 Summary
      33. Slide 33 Spotfire Value Drivers
      34. Slide 34 Closing the Loop
      35. Slide 35 2-Second Advantage 1
      36. Slide 36 2-Second Advantage 2
  3. Spotfire Dashboard
  4. Research Notes
  5. Keynotes
    1. KN-1 Creating Business Cases, Re‐engineering Processes, and Driving Results
      1. Paul Brubaker
      2. Mark Day
      3. Mark Forman, Moderator
      4. Keith Trippie
  6. Spotlight Sessions
    1. SS1-1 Harnessing Big Data for Identity Intelligence
      1. Rex Keith
    2. SS1-2 Applying Fraud Lessons from the Financial Sector to Program Integrity
      1. Andy Smith
    3. SS1-3 Big Data in Motion
      1. Atif Chaughtai
  7. Technology Roundtable Program
    1. Table #17: Fighting the Invisible Enemy Using Predictive Analytics
      1. Facilitator: Nimish Rawal, Principal Solutions Consultant, TIBCO
    2. Table #17: The Power of Big Data: 3 Things to Consider When Selecting a Big Data Solution
      1. Facilitator: Rick Jenkins, Sr. Solutions Consultant, TIBCO
  8. Government IT Forum Kicks Off Training; Conference and Expo Tuesday
  9. Presentations
    1. Cloud & Virtualization Sessions
      1. Emerging Trends: How to Take Advantage of IT as a Service Model
      2. Cloud Confidence from a US Government Information Security Professional’s Perspective
      3. Automation, Brokering, and the Cloud
    2. Cybersecurity Sessions
      1. Internal vs. External Threats: Reducing the Risks
      2. Self-Learning Predictive Analysis of Web Threats Using Behavioral Modeling Techniques
      3. Network Security: It’s What You Can’t See That Will Sink You
      4. FedRAMP/ATO Update
      5. Continuous Reauthorization: Bridging the Gap Between FISMA and Continuous Monitoring
    3. Mobile Government Sessions
      1. Policy vs. Reality - Current Platforms Are Moving Faster than Agencies
      2. Creating a Mobile and Flexible Government
    4. Big Data & Business Intelligence Sessions
      1. Bridging the Gap Between Commodity IT and Mission IT
      2. Big Data – Veracity Completes the Puzzle
    5. Records & Information Management Sessions
      1. Unifying and Evolving Records and Information Management within a Large Federal Agency
      2. Year One of the Managing Government Records Directive
      3. In Search of Automated Electronic Records Management Solutions: Goal A3 of the Managing Government Records Directive
    6.  Future Government Technology Leaders
      1. Moving from Rising Star to Leader: Mentoring, Networking and Social Media
      2. Generational Differences and How to Overcome Them: Pros/Cons of Alternate Work Sites and Gamification
    7. Spotlight Sessions
      1. Appian: Making Innovation Rapid and Cost-Effective
      2. BeyondTrust: The Challenges and Real World Results of Automating STIG Compliance with SCAP Assessment Solutions
      3. BlueCat: Security Intelligence for Today's Network
      4. Brocade: Optimizing the Federal Data Center
      5. CA Technologies: Using Mobile Devices as a Derived Credential - A Software Strategy
      6. Centrify: Samsung KNOX for Federal Explained
      7. CommVault: Management: Becoming Data Driven in a World of Big Data and Cloud Computing
      8. Equifax: Harnessing Big Data for Identity Intelligence
      9. Equifax: Applying Fraud Lessons from the Financial Sector to Program Integrity
      10. GovPlace: Lowest Price, Technically Superior
      11. Fusion-io: Increasing Performance While Decreasing the Footprint of NoSQL Using ioMemory
      12. Panzura: Accelerating the Deployment of Your Cloud Vision
      13. TIBCO: Big Data in Motion
  10. NEXT

Story

Government IT Forum Kicks Off Training; Conference and Expo Tuesday, December 3, 2013

I thought the fornat of this event was excellent. I enjoyed moving easily from Opening Keynote Panel, to Exhibits, to Spotlight Sessions, and then to the Roundtable Luncheon. I had to leave before hearing any of the Conference Sessions.

It was nice to see my mentor, Mark Forman, moderating the Opening Keynote Panel, with former EPA CTO and supervisor, Mark Day. I essentially Create Business Cases, Re‐engineering Processes, and Drive Results everyday as a practicing data scientist using Spotfire and Be Informed.

I attended the Big Data & Business Intelligence Track Spotlight Sessions in the Exhibit Hall as follows:

  • Harnessing Big Data for Identity Intelligence, Rex Keith, Senior Director, Product Management, Equifax
  • Applying Fraud Lessons from the Financial Sector to Program Integrity, Andy Smith, Senior Vice-President, Fraud and Analytics, Equifax
  • Big Data in Motion, Atif Chaughtai, Technology Officer, TIBCO

I had submitted a proposal for this track based on my OMB Data Visualization Tool Requirements Analysis.

I was especially glad to see TIBCO as an Exhibitor and Host of Two Roundtable Discussions:

  • The Power of Big Data: 3 Things to Consider When Selecting a Big Data Solution, Facilitator: Rick Jenkins, Sr. Solutions Consultant, TIBCO
  • Fighting the Invisible Enemy Using Predictive Analytics, Facilitator: Nimish Rawal, Principal Solutions Consultant, TIBCO

which I participated in using my extensive knowledge of TIBCO and Spotfire products. I provided answers to questions using specific examples from Open Government Data and as a Resource Person for the Intelligence Community.

I told about my history with the original Spotfire with Dr. Ben Schniederman and Christopher Ahlberg and my experience with S+ and then learning that TIBCO had acquired both and combined them into TIBCO Spotfire. I considered this a brilliant stroke of genius that gave me the tools I had always wanted integrated together! I have over 350 Silver Spotfire application running in their cloud library. In fact, Atif Chaughtai showed a screen capture of one that I did with Jim Hawley, formerly with TIBCO Spotfire, and now with MapR, for DoD.

I suggested three activities:

  • TIBCO Spotfire Users Group using Meetup.com.
  • Connection to Graph Databases like YarcData and Neo4j
  • Partnerships with the Federal Big Data Initiative, Universities like George Mason, and government agencies like NIH.

I thought the Big Data in Motion (Atif Chaughtai, Technology Officer, TIBCO) slides were the best I have ever seen from TIBCO Spotfire as follows:

Volume
– “Big Data” = Hadoop MapReduce, Cloudera Impala
– Large “In Database” = Teradata, Exadata, Vertica, Greenplum…..
Variety
– Unstructured Data: Attivio, Clarabridge…
Velocity
– TIBCO e.g. Enterprise Service Bus -> Business Events -> Active Spaces…
Complexity
– R, TERR, S+, SAS, Matlab
– Complex Event Processing: Business Events

1105 Media Publications Highlights (I skim read and find interesting things to my readers):

Equifax: Two Spotlight Talks

  • Data beats math
  • Big Data linked to an individual can provide valuable insight
  • Linking back to key Big Data assets allows you to leverage personal information to more accurately verify questionable identifiers

MORE TO FOLLOW

Slides

TIBCO

Slides

Slide 1 Big Data Solutions for US Federal Government

AtifChaughtai12032013Slide1.png

Slide 2 Vivek Ranadive TIBCO CEO

AtifChaughtai12032013Slide2.png

Slide 3 How the "Two Second Advantage" Works Together for DHS

AtifChaughtai12032013Slide3.png

Slide 4 Your IT Infrastructure 1

AtifChaughtai12032013Slide4.png

Slide 5 Your IT Infrastructure 2

AtifChaughtai12032013Slide5.png

Slide 6 Event Enabled Enterprise

AtifChaughtai12032013Slide6.png

Slide 7 Government Track Record

AtifChaughtai12032013Slide7.png

Slide 8 TIBCO in the Federal Government

AtifChaughtai12032013Slide8.png

Slide 9 TIBCO and Big Data

AtifChaughtai12032013Slide9.png

Slide 10 More Complexity

AtifChaughtai12032013Slide10.png

Slide 11 Big Data

AtifChaughtai12032013Slide11.png

Slide 12 Extreme Information

AtifChaughtai12032013Slide12.png

Slide 13 Data in Motion Close the Loop

AtifChaughtai12032013Slide13.png

Slide 14 Why Close the Loop?

AtifChaughtai12032013Slide14.png

Slide 15 Real Time Events

AtifChaughtai12032013Slide15.png

Slide 16 Information Flow for Real-time Intelligence Processing

AtifChaughtai12032013Slide16.png

Slide 17 Case in Point: A Healthcare Organization 1

AtifChaughtai12032013Slide17.png

Slide 18 Case in Point: A Healthcare Organization 2

AtifChaughtai12032013Slide18.png

Slide 19 Spotfire Big Data Analytics

AtifChaughtai12032013Slide19.png

Slide 20 Spotfire and Proctor & Gamble

AtifChaughtai12032013Slide20.png

Slide 21 System Requirements

AtifChaughtai12032013Slide21.png

Slide 22 Spotfire & Big Data: How it's Done

AtifChaughtai12032013Slide22.png

Slide 23 Beyond In-Memory: In-database Analytics

AtifChaughtai12032013Slide23.png

Slide 24 Volume: Spotfire + Teradata

AtifChaughtai12032013Slide24.png

Slide 25 A Hybrid Approach: Data on Demand

AtifChaughtai12032013Slide25.png

Slide 26 Spotfire & ADS: Hadoop as an Example

AtifChaughtai12032013Slide26.png

Slide 27 Spotfire & Composite Information Server

AtifChaughtai12032013Slide27.png

Slide 28 Spotfire Advanced Data Services - Other Big Data Sources

AtifChaughtai12032013Slide28.png

Slide 29 Spotfire & Extreme Information

AtifChaughtai12032013Slide29.png

Slide 30 Spotfire Statistics Services

AtifChaughtai12032013Slide30.png

Slide 31 Spotfire's Predictive Analytics Ecosystem

AtifChaughtai12032013Slide31.png

Slide 32 Summary

AtifChaughtai12032013Slide32.png

Slide 33 Spotfire Value Drivers

AtifChaughtai12032013Slide33.png

Slide 34 Closing the Loop

AtifChaughtai12032013Slide34.png

Slide 35 2-Second Advantage 1

AtifChaughtai12032013Slide35.png

Slide 36 2-Second Advantage 2

AtifChaughtai12032013Slide36.png

 

Spotfire Dashboard

For Internet Explorer Users and Those Wanting Full Screen Display Use: Web PlayerGet Spotfire iPad App

Research Notes

Schedule

Tuesday, December 3, 2013
9:00 AM - 10:00 AM          Opening Keynote Panel - Creating Business Cases, Re‐engineering Processes, and Driving Results
10:00 AM - 10:30 AM          Coffee in Exhibit Hall
10:00 AM - 4:30 PM          Exhibit Hall Open
10:30 AM - 12:45 PM         Conference Sessions
10:00 AM - 12:45 PM         Spotlight Sessions in Exhibit Hall
12:45 PM - 2:00 PM         Roundtable Luncheon
2:15 PM - 4:30 PM          Conference Sessions
2:15 PM - 5:00 PM         Spotlight Sessions in Exhibit Hall
5:00 PM - 6:00 PM          Afternoon Networking Reception in Exhibit Hall

Keynotes

Source: http://govcloudconference.com/Events/2013/Sessions/Tuesday/KN-1-Creating-Business-Cases-Reengineering-Processes-and-Driving-Results.aspx

KN-1 Creating Business Cases, Re‐engineering Processes, and Driving Results

12/03/2013 

9:00 AM - 10:00 AM

Paul Brubaker

Paul Brubaker

Director, Planning and Performance Management, DoD

Mark Day

Mark Day

Director, Office of Strategic Programs, Integrated Technology Services, Federal Acquisition Service, GSA

Mark Forman, Moderator

CEO, Government Transaction Services, Inc.

Keith Trippie

Keith Trippie

Executive Director, Enterprise Development Office, Office of the Chief Information Officer, DHS

Spotlight Sessions

SS1-1 Harnessing Big Data for Identity Intelligence

Source: http://govcloudconference.com/Events/2013/Sessions/Tuesday/SS1-1-Harnessing-Big-Data-for-Identity-Intelligence.aspx

12/03/2013, 10:00 AM - 10:45 AM

Rex Keith

Senior Director, Product Management, Equifax

Confirming the identities of users in large external user populations can be challenging. A government agency giving a citizen access to sign up for benefits or check records may potentially be challenged with identifying a single person among more than 230 million adults. Combating identity-based fraud on that scale can be even more challenging. Identity Intelligence must incorporate both fraud mitigation (data integrity) and identity verification (proving that the applicants are who they say they are).

Analytics propel and support the processes that control identity verification and data integrity – through the use of data driven procedures that enable better decisions to be made. Back end analytics provide pertinent information to ensure the processes are being used most effectively, and overall identity fraud-mitigation objectives are on track.

Learning Objectives:

  • Understand the relationship between data points and appropriately link them.
  • Learn how linking unstructured data to structured, known data points allows you to use many additional facts to properly identify users and transactions.
  • Learn which users need knowledge based authentication and when?
  • Learn how to analytically approach your strategy and take the right steps for good identity fraud management.
  • Learn if you have moved beyond regulatory compliance in handling potential fraud?
  • Learn how to meet regulatory requirements. To minimize fraud and improve user experience, more is usually required.

SS1-2 Applying Fraud Lessons from the Financial Sector to Program Integrity

Source: http://govcloudconference.com/Events/2013/Sessions/Tuesday/SS1-2-Applying-Fraud-Lessons-from-the-Financial-Sector-to-Program-Integrity.aspx

12/03/2013, 11:00 AM - 11:45 AM

Andy Smith

Senior Vice-President, Fraud and Analytics, Equifax

Trends in fraud management in the commercial sector have evolved as more business has moved online, where the applicant can easily hide under a stolen or made-up identity.  Public sector agencies can learn from their experience to move beyond chasing after the fact to preventing fraud before it happens.

Equifax has extensive experience working in the financial sector and with major government agencies to help identify fraudulent applicants before they get in the front door. Working across verticals means that lessons from each are combined to create a complete view of fraud behavior and best practices for combating it.

The key to success is a multi-phase approach that encompasses identity verification and appropriate application of unstructured big data to improve fraud mitigation. Focus on prevention measures, including identity proofing that uses a broad range of data elements to verify the applicant’s identity.

Learning Objectives:

  • How the right “big data” helps identify applicants
  • When to apply more detailed authentication to uncover fraud
  • How to meet and exceed regulatory mandates to create a robust fraud mitigation process

SS1-3 Big Data in Motion

Source: http://govcloudconference.com/Events/2013/Sessions/Tuesday/SS1-3-Big-Data-in-Motion.aspx

12/03/2013, 12:00 PM - 12:45 PM

Atif Chaughtai

Technology Officer, TIBCO

Fulfilling the promise of Big Data requires solutions that facilitate real-time access to diverse data sources in a secure and reliable manner for the enterprise. TIBCO is a leader in delivering infrastructure that helps government agencies access data, automate processes, identify patterns of interest and share information securely.
 
Learning Objectives:

  • Gain inside knowledge from big data
  • Learn how to act on big data in real time
  • Learn why you should care about big data in motion

Technology Roundtable Program

Source: http://govcloudconference.com/events/2013/information/technology-roundtables.aspx

December 3, 2013 from 12:45 PM - 2:00 PM

The Technology Roundtables will give attendees the opportunity to brainstorm, network, and engage in meaningful discussions with peers. Check out the topics and table captains below to help you choose which discussion to participate in!

Table #17: Fighting the Invisible Enemy Using Predictive Analytics

Facilitator: Nimish Rawal, Principal Solutions Consultant, TIBCO

Table #17: The Power of Big Data: 3 Things to Consider When Selecting a Big Data Solution

Facilitator: Rick Jenkins, Sr. Solutions Consultant, TIBCO

Government IT Forum Kicks Off Training; Conference and Expo Tuesday

Source: December 2, 2013 Email

 

FOR IMMEDIATE RELEASE

Government IT Forum Kicks Off Training; Conference and Expo Tuesday                               

Conference Schedule to Include Breakout Sessions, Keynote, Technology Roundtables and More

Vienna, Va - December 2, 2013 - The Government IT Forum-the co-located conference of five events covering cloud and virtualization, cybersecurity, mobile government, big data and business intelligence and records and information management-will take place tomorrow, Tuesday, December 3 at the Walter E. Washington Convention Center in Washington, DC.

"The Government IT Forum is a single jam-packed day giving attendees many opportunities to engage with their peers and thought leaders in the federal IT environment," said David Myers, Event Director, Public Sector Events, 1105 Media, Inc.  "Not only are we excited to offer traditional conference elements - like a morning keynote and training sessions - but we're also looking forward to the idea sharing, brainstorming and learning from peers that happens during the technology roundtables and interactive networking reception."

The Technology Roundtables will take place during lunch on Tuesday, December 3 and will feature topics relevant to big data, cloud, cyber, mobile and records and information management issues.  There will be more than 30 topics for attendees to choose from, including: 

  • Big Data and Business Intelligence - Analysts and Security Data 
  • Continuous Monitoring and Compliance (CDM) 
  • Cybersecurity- Privileged Identity Management 
  • Facilitating Open Gov through APIs - Securely Expose Public Data 
  • Mobility in Government - How to Support Both Future First and BYOD Initiatives 
  • Network Virtualization to Meet Unique Mission Needs
  • Public vs. Private Cloud in Federal Government 
  • Software Defined Data Centers and the Federal Cloud First Mandate 
  • Using Predictive Modeling for Fraud Mitigation                              

Tomorrow's conference will also include Spotlight Sessions in the exhibit hall, more than 15 breakout sessions and an opening keynote panel.  The opening keynote will address the need for technology policy changes in the government and will explore how to achieve results.  Speakers for the panel include:

  • Moderator: Mark Forman, Chief Executive Officer, Government Transaction Services
  • Paul Brubaker, Director, Planning and Performance Management, Department of Defense
  • Mark Day, Director, Office of Strategic Programs, Integrated Technology Services, Federal Acquisition Service, General Services Administration
  • Keith Trippie, Executive Director, Enterprise Development Office, Office of the Chief Information Officer, Department of Homeland Security (invited)

Conference keynote, tracks and technology roundtable sessions* are open to all registered attendees.  All sessions are free to government attendees.  For more information and to access the full program agenda, visit www.govitforum.com or download the Government IT Forum Mobile App

*Lunch during the Technology Roundtables is on a first-come, first-served basis.

About 1105 Media Public Sector Events Group

1105 Media Public Sector Events Group, a division of 1105 Media, Inc., is the leading producer of exhibitions, conference and executive events for the education, government and defense information technology industry, as well as the private sector enterprise technology market.  http://www.1105media.com

Media Contact:                                

Lori Ertel

ConnellyWorks, Inc.                                                                                       

571-323-2585 ext. 2250

lori@connellyworks.com

 
 
 
 

Presentations

Source: http://govitforum.com/presentations

Thank you for attending the 2013 Government IT Forum! Presentations from the Educational program are available below.

*Please note: All presentations received to date and approved to be posted on the website are below. We will update the website continuously as new presentations are received.

TUESDAY, DECEMBER 3

Cloud & Virtualization Sessions

Emerging Trends: How to Take Advantage of IT as a Service Model

Cloud Confidence from a US Government Information Security Professional’s Perspective

Automation, Brokering, and the Cloud

 

Cybersecurity Sessions

Internal vs. External Threats: Reducing the Risks

Self-Learning Predictive Analysis of Web Threats Using Behavioral Modeling Techniques

Network Security: It’s What You Can’t See That Will Sink You

FedRAMP/ATO Update

Continuous Reauthorization: Bridging the Gap Between
FISMA and Continuous Monitoring

  • Chris Hoover, RSA Archer                                

Mobile Government Sessions

Policy vs. Reality - Current Platforms Are Moving Faster than Agencies

Creating a Mobile and Flexible Government

  • Nathan Golan, IBM

Big Data & Business Intelligence Sessions

Bridging the Gap Between Commodity IT and Mission IT

Big Data – Veracity Completes the Puzzle

  • Adam Dietz, LexisNexis

Records & Information Management Sessions

Unifying and Evolving Records and Information Management within a Large Federal Agency

Year One of the Managing Government Records Directive

  • Donald Rosen, NARA                                        

In Search of Automated Electronic Records Management Solutions: Goal A3 of the Managing Government Records Directive

  • Meg Phillips, NARA                                   

 Future Government Technology Leaders

Moving from Rising Star to Leader: Mentoring, Networking and Social Media

  • Naveen Krishnamurthy, RIVA Solutions (Moderator)
  • Anjali Dighe, LeapFrog Solutions
  • Duane Cummings, CGI Federal
  • Giovanni Onwuchekwa, GSA
  • Emily Hsu, Agile Defense

Generational Differences and How to Overcome Them: Pros/Cons of Alternate Work Sites and Gamification

Spotlight Sessions

Appian: Making Innovation Rapid and Cost-Effective

BeyondTrust: The Challenges and Real World Results of Automating STIG Compliance with SCAP Assessment Solutions

BlueCat: Security Intelligence for Today's Network

Brocade: Optimizing the Federal Data Center

CA Technologies: Using Mobile Devices as a Derived Credential - A Software Strategy

Centrify: Samsung KNOX for Federal Explained

  •  David McNeely, Centrify

CommVault: Management: Becoming Data Driven in a World of Big Data and Cloud Computing

Equifax: Harnessing Big Data for Identity Intelligence

Equifax: Applying Fraud Lessons from the Financial Sector to Program Integrity

GovPlace: Lowest Price, Technically Superior

Fusion-io: Increasing Performance While Decreasing the Footprint of NoSQL Using ioMemory

Panzura: Accelerating the Deployment of Your Cloud Vision

TIBCO: Big Data in Motion

NEXT

Page statistics
3940 view(s) and 20 edit(s)
Social share
Share this page?

Tags

This page has no custom tags.
This page has no classifications.

Comments

You must to post a comment.

Attachments