66 past events found
+ 4 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
AccessData Product Test Drive Seminar a...
Join AccessData and your peers on Wednesday, March 29 for a half-day session where you can get your hands digitally dirty and test drive AD Lab’s unique, industry-leading investigative platform, and we're hoping you can join us! During this event you will learn how to handle even the most demanding caseloads without slowing down—saving you time and money. You won’t want to miss seeing a product with nearly limitless scalabili...
March 29, 2017
Organizer: AccessData Group
Location: Sterling, VA
Add Favorite
2016 Cyber Security Brainstorm
Cyber Marathon – Hitting The Wall? It’s been a year since the OPM breach — and the 90-day cyber sprint has turned into a cyber marathon. CDM and CAP Goals giving way to CNAP and CSIP initiatives in the front of the pack. FedRAMP appears to have stumbled getting out of the blocks. Which cyber initiatives will empower agencies to make the final kick to the finish line? And what efforts are the lactic acid in the government...
September 13, 2016
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer: SecureAuth
Location: Chicago, IL
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 10, 2015
Organizer: SecureAuth
Location: Palo Alto, CA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer: SecureAuth
Location: Arlington, VA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer: SecureAuth
Location: New York, NY
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer: SecureAuth
Location: Boston, MA
Add Favorite
ACT-IAC Rocky Mountain Chapter Lunch wi...
The Rocky Mountain Chapter is pleased to announce that Robert Lee, Liaison Officer for the Department of Homeland Security and Mark McCadden, Theater Security Cooperation/C4 Counter Narcotics Specialist for NORAD/USNORTHCOM, will speak at Cool River Café about security and technology. During this presentation Robert Lee will be addressing the role and responsibilities of the Department of Homeland Security. He will discuss critical infr...
June 24, 2015
Organizer: ACT-IAC
Location: Greenwood Village, CO
Add Favorite
9th Annual Border Security Expo
Border security leadership from federal, state, and local law enforcement, military, international officials, and industry professionals will converge in Phoenix, at Border Security Expo, the world’s largest show and conference focused on issues confronting borders. The 2015 event will feature: A world renowned conference focused on: Countering Transnational Organized Crime: An Important Componentof Counter-Terrorism Strategy Awards pres...
April 21-22, 2015
Organizer: Eagle Eye Expositions LLC
Location: Phoenix, AZ
Add Favorite
Back to Search Begin New Search