Back to Search Begin New Search Save Search Auto-Notify
Open Source Intelligence (OSINT) and So...
Get a live demonstration of Social Navigator, used by government and corporations around the world to monitor social meda and open source channels for threats against people and assets. Used for threat detection, situational awareness, fraud protection, data leaks, corporate governance and executive protection. Social Navigator combs billions of posts across all major social media channels, boards, blogs, paste sites, chat rooms, deep and dark...
December 14, 2017
Organizer: Hypersight Technology Group
Location: Webcast
Add Favorite
Import FDA in the Automated Commercial...
OVERVIEW This webinar focuses on the role of the import managers when shipping goods under the FDA and Customs Regulations. It also addresses what regulations can be used to help the importer in understanding Automated Commercial Environment (ACE) as the Sole CBP-Authorized Electronic Data Interchange (EDI) System for Processing Certain Electronic Entry and Entry Summary Filings Accompanied by Food and Drug Administration (FDA) Data. This revi...
December 14, 2017
Organizer: Training Doyens
Location: Webcast
Add Favorite
CXO Tech Forum: A.I. in Government
Join GovernmentCIO Magazine on Dec. 14 at the House of Sweden for an evening that explores the current state of A.I. in government and its potential to change the economy, the workforce, and society writ large. The forum will feature A.I. experts in government, academia, and industry pushing the boundaries of A.I. technologies and the ways it could revolutionize government. The evening will include a networking reception at one of Washington's...
December 14, 2017
Organizer: GovernmentCIO Magazine
Location: Washington, DC
Add Favorite
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
December 14, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Ugly Christmas Sweater Cyber Smoke Pres...
It's time to kick of the Holiday Season in style with your government and industry information management and technology colleagues at the 2017 Ugly Christmas Sweater Cyber Smoke Event presented by Intelvative in partnership with AFFIRM. The 2017 Cyber Smoke Series is sponsored by Acquia, Bromium, Crowdstrike, Cylance, Cynergy, FireEye, Forescout, One Identity, Symantec, Tanium, Tenable, and Trustwave The deck at Morton's will be open to enjoy...
December 14, 2017
Organizer: AFFIRM
Location: Washington, DC
Add Favorite
Predictive Analytics: Failure to Launch
How to Get Analytic Modeling Off the Ground and Into Orbit The vast majority of BI professionals and big data enthusiasts are excited about the prospects of predictive analytics and data mining, but are fully mystified about where to begin or even how to prepare. Of those who did initiate a modeling initiative, an industry survey of predictive modeling practitioners reported that 51% of data mining projects either never left the ground, did no...
December 13, 2017
Organizer: The Modeling Agency
Location: Webcast
Add Favorite
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
December 12, 2017
Organizer: Haines Security Solutions
Location: Webcast
Add Favorite
Implementation and Management of GMP Da...
OVERVIEW Data integrity is the assurance that data records are accurate, complete, intact and maintained within their original context, including their relationship to other data records. This definition applies to data recorded in electronic and paper formats or a hybrid of both. To assure the quality of raw materials, in process materials and finished goods, laboratory data integrity is assuming greater importance in current Good Manufacturi...
December 12, 2017
Organizer: Training Doyens
Location: Webcast
Add Favorite
Best Practices in as-a-Service IT: Less...
The Space and Naval Systems Command’s mission is to deliver interoperable and secure information warfare capability by acquiring and integrating sensors, communications, weapons, information and control systems for existing and future ships, aircraft, submarines, unmanned systems and the associated shore-based support systems. The “As-a-Service” model is changing the delivery of IT modernization by providing an agile acquisit...
December 12, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Developer Meetup: Unlock the Value of A...
Cloud is the ideal platform for leveraging the full value of artificial intelligence and other advanced technologies. Doing so, however, requires a solid grasp of what's possible -- and a clear plan for turning the available tools and technologies into mission-enabling applications. Don't miss this opportunity to network and learn with fellow developers and AI practitioners. During this special evening meetup, you can dig into cloud-based Wats...
December 12, 2017
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Back to Search Begin New Search