32 past events found
Back to Search Begin New Search Save Search Auto-Notify
ICIT Webast: Secure Intelligent Automat...
ICIT Webinar / Secure Intelligent Automation for Mission Readiness/ Co-Chaired By BluePrism and IBM The daily requirements imposed on military and civilian activities continue to grow far more rapidly than budget and resource allocations. One key to mitigating these ever-expanding mission requirements is a connected intelligent automation platform and enterprise approach to automation. While automation has already demonstrated its value to th...
June 25, 2020
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
24 Hour Citizen Hackathon
During 24 hours, mixed teams of designers, architects, researchers, academics, urban planners, students, social entrepreneurs, city council representatives and business representatives will work together with a fellow citizen and design partner (lead user) to come up with inclusive solutions in response to the Hackathon challenge. Participatory Urbanism 2017 is a two-day event on 7-8 April in Brussels, Belgium, that brings together scientists,...
April 7-8, 2017
Organizer: Participatory Urbanism
Location: Brussels, BE
Add Favorite
Participatory Urbanism 2017
The Participatory Urbanism Forum is the highlight of 4 years of interdisciplinary collaboration between researchers, city planners, architects, and urban activists in 30 countries. The collaboration aims to promote evidence-based insights on how to empower cities and urban hubs through citizen engagement and participatory planning. It brings together public officials, urban activists, businesses and researchers to launch the European Charter o...
April 7-8, 2017
Organizer: Participatory Urbanism
Location: Brussels, BE
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
November 8-10, 2016
Organizer: iSMG
Location: London, GB
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
September 27-28, 2016
Organizer: iSMG
Location: Amsterdam, NL
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
September 13-14, 2016
Organizer: iSMG
Location: Toronto, CA
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
August 2-4, 2016
Organizer: iSMG
Location: New York, NY
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
July 12-13, 2016
Organizer: iSMG
Location: Boston, MA
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
June 21-22, 2016
Organizer: iSMG
Location: Chicago, IL
Add Favorite
Fraud & Breach Prevention Summit
The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approac...
May 17-18, 2016
Organizer: iSMG
Location: Washington, DC
Add Favorite
Back to Search Begin New Search