95 past events found
+ 3 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 10, 2015
Organizer: SecureAuth
Location: Palo Alto, CA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer: SecureAuth
Location: Arlington, VA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer: SecureAuth
Location: New York, NY
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer: SecureAuth
Location: Boston, MA
Add Favorite
International Cooperation in the Arctic...
Join us on Friday, October 23rd at noon at the Anchorage Hilton Hotel for a panel discussion about global cooperation in the Arctic, particularly focusing on the role of the Arctic Council. Panelists include Ambassador David Balton, Deputy Assistant Secretary for Oceans and Fisheries; Anders Oskal, Director of the International Centre for Reindeer Husbandry; Margaret Williams, Managing Director of the U.S. Arctic Program at the World Wildlife...
October 23, 2015
Organizer: Alaska World Affairs Council
Location: Anchorage, AK
Add Favorite
ACT-IAC Rocky Mountain Chapter Lunch wi...
The Rocky Mountain Chapter is pleased to announce that Robert Lee, Liaison Officer for the Department of Homeland Security and Mark McCadden, Theater Security Cooperation/C4 Counter Narcotics Specialist for NORAD/USNORTHCOM, will speak at Cool River Café about security and technology. During this presentation Robert Lee will be addressing the role and responsibilities of the Department of Homeland Security. He will discuss critical infr...
June 24, 2015
Organizer: ACT-IAC
Location: Greenwood Village, CO
Add Favorite
Transformative Technologies: Cloud, Big...
COMPLIMENTARY BRIEFING
October 8, 2014
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Cyber Security Brainstorm
Join MeriTalk’s Cyber Security Exchange for the second annual Cyber Security Brainstorm on Wednesday, June 18, 2014 at the at the Knight Conference Center at the Newseum in Washington, D.C. The event will bring together savvy Federal cyber security experts to share best practices, collaborate on challenges, and discuss what is needed for the future of cyber security. More details coming soon. For more information, contact Lisa Futterman...
June 18, 2014
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
CEIC - Computer & Enterprise Investigat...
Guidance Software is proud to host CEIC 2014, one of the largest international gatherings of security, legal, enterprise, law enforcement, government, and risk and compliance attendees in the world, with a focus on the latest developments in digital investigations and invaluable training for EnCE® and EnCEP® certifications. A large number of our CEIC attendees return to this conference year after year for a unique blend of high-quality...
May 19-22, 2014
Organizer: Guidance Software
Location: Las Vegas, NV
Add Favorite
Back to Search Begin New Search