BEGIN:VCALENDAR PRODID:-//AFCEA//Calendar//EN VERSION:2.0 METHOD:PUBLISH X-PUBLISHED-TTL:PT24H X-WR-CALNAME:AFCEA Calendar X-WR-CALDESC:AFCEA Calendar BEGIN:VEVENT UID:60132afcea DTSTAMP;VALUE=DATE:20240328T010000 LAST-MODIFIED;VALUE=DATE:20240328T010000 ORGANIZER:Central Maryland Chapter DTSTART;VALUE=DATE:20220112T090000 DTEND;VALUE=DATE:20220112T170000 SUMMARY:RESCHEDULED: AFCEA CMD Emerging Leaders January Social Sponsored by CyberCore Technologies and NPower LOCATION:Mutiny Pirate Bar & Island Grille 7190 Troy Hill Dr Elkridge MD 21075 Elkridge MD DESCRIPTION:< p> PLEASE NOTE: This Social has been rescheduled to next month February 9th 2022.< /p> < p> This event is part of the Emerging Leaders social schedule held on the second Wednesday of every month where the Emerging Leaders host a happy hour to network and discuss training programs upcoming activities and ideas for new initiatives. You do not have to be an Emerging Leader to come but we ask you to bring one if you do. Help the chapter grow and we can offer more events! To join contact el@centralmd.afceachapters.org.< /p> PRIORITY:3 END:VEVENT BEGIN:VEVENT UID:60951afcea DTSTAMP;VALUE=DATE:20240328T010000 LAST-MODIFIED;VALUE=DATE:20240328T010000 ORGANIZER:North Carolina Chapter DTSTART;VALUE=DATE:20220112T090000 DTEND;VALUE=DATE:20220112T170000 SUMMARY:Monthly Luncheon LOCATION:Iron Mike Conference Center Fort Bragg NC DESCRIPTION:COL Marne Sutton USFORSCOM G6 will talk about challenges and opportunities she has faced as a senior leader. PRIORITY:3 END:VEVENT BEGIN:VEVENT UID:61252afcea DTSTAMP;VALUE=DATE:20240328T010000 LAST-MODIFIED;VALUE=DATE:20240328T010000 ORGANIZER:Silicon Valley Chapter DTSTART;VALUE=DATE:20220112T090000 DTEND;VALUE=DATE:20220112T170000 SUMMARY:Can You Trust Your Artificial Intelligence? Data Validation for Intrinsic Cybersecurity Risk Mitigation LOCATION:Web DESCRIPTION:Cybersecurity is anything to do with digital risk. It is not exclusive to protecting systems from hackers and enemy bad actors. In terms of Artificial Intelligence and decision algorithms two main cyber threats need to be mitigated:1. External Risk: This is what we think of when we hear cybersecurity. Hackers and bad actors are manipulating our systems.2. Intrinsic Risk: This is what we think of a lot less when discussing cyber security. This includes flawed engineering legacy equipment insufficient data and what happens once external risk mitigation fails.Although it may be counterintuitive the number one risk to deployed Artificial Intelligence systems is NOT bad actors and hackers but the data the system depends on. https://siliconvalley.afceachapters.org/can-you-trust-your-artificial-intelligence-data-validation-intrinsic-cybersecurity-risk-mitigation#overlay-context=can-you-trust-your-artificial-intelligence-da PRIORITY:3 END:VEVENT END:VCALENDAR