Back to Search Begin New Search Save Search Auto-Notify
Modernize Identity and Access Managemen...
Higher education delivers mission critical value to students, faculty, and other personas. However, in many cases, there is a struggle to increase stakeholder productivity, deliver engaging experiences, streamline identity management, and deliver consistent, robust, and secure access across applications and resources. In this webinar we will cover how higher education organizations should consider transforming IAM through outcome driven, prove...
May 21, 2024
Organizer: IBM
Location: Webcast
Add Favorite
IBM TechXchange: Security User Forum Atlanta
Join us for this User Forum created to connect and discuss all things IBM Security - Identity and Access Management, Data Security, Security Orchestration, Automation and Response (SOAR), and SIEM with other product users as well as IBM experts. At this event, we will host individual product user groups for current customers. In each session, IBM experts will highlight best practices and showcase hands on demos, while current customers are inv...
March 28, 2024
Organizer: IBM
Location: Atlanta, GA
Add Favorite
Reinvent Readiness with Cognitive Technology
General Gustave "Gus" Perna, Commander of the Army Materiel Command, repeatedly stresses readiness as the Army’s most fundamental priority. Defined broadly as the ability of the U.S. armed forces to perform their required missions, whether against near-peer or asymmetric threats, “readiness” is shaped by many factors. These include the ability and well-being of military personnel and the availability and performance of milita...
April 3, 2023
Organizer: IBM
Location: Webcast
Add Favorite
Data Fabric Implementation
According to a new report by Market Connections, 61-percent of Department of Defense respondents are at least somewhat familiar with the DoD Data Strategy and 60-percent of all respondents are at least somewhat familiar with the Federal Data Strategy. Furthermore, seventy-percent of respondents report that their organization has started implementing a data strategy of their own. But modernizing security architectures, a lack of internal resour...
December 7, 2022
Organizer: IBM
Location: Webcast
Add Favorite
Risk Quantification and Management with...
Quantifying security risk--putting risk in dollars and cents--is notoriously challenging. Yet for security and risk leaders to manage their organization's exposure to threats effectively, they need to be able to quantify, evaluate and manage security risks. Quantifying security risk into financial terms helps connect security risk management with overall business strategy. In this webinar, our experts will discuss the best approaches to quanti...
June 15, 2021
Organizer: IBM
Location: Webcast
Add Favorite
Make Sure You’re Ready for Tomorrow’s C...
The cloud holds enormous potential for business advantages such as efficiency and innovation, but also introduces new security threats of more distributed environments for organizations to manage and secure. When done right, the cloud can make security scalable and more adaptable – but first, organizations need to let go of legacy assumptions and pivot to new security approaches designed specifically for this new frontier of technology,...
November 10, 2020
Organizer: Palo Alto Networks
Location: Webcast
Add Favorite
IBM Government Analytics Forum 2016
Wherever you are in the mission space – IT, development, program management, research or analysis – we all have one thing in common: We strive to meet mission outcomes that will transform and improve government services. But in a world of exponential change, federal agencies must continue to be innovative, agile and informed in order to make the best possible decisions to achieve results.Advanced analytics insight is key to keeping...
May 5, 2016
Organizer: IBM
Location: Washington, DC
Add Favorite
Analytics of Multi-Cultural Name Information
Managing, matching, and analyzing cultural name data continues to be one of the most challenging aspects of recognizing those masking or misrepresenting their identities. Long before the attacks on the USS Cole, Pentagon and World Trade Center, there was the 1993 shooting at the CIA Headquarters where Mir Aimal Kansi, a Pakistani militant, killed two and wounded three CIA employees. Kansi had entered the United Status under the family name Ka...
February 16, 2016
Organizer: IBM
Location: Webcast
Add Favorite
IBM i2 Summit for a Safer Planet
Threats to societies and organizations have never been more numerous or intense. From fraud and cybercrime, criminal and terrorist threats to weather related disasters and infrastructure emergencies, communities, corporations and countries must prepare for threats, accelerate responses and prevent future harm. How prepared is your organization to combat these ever increasing threats? Join us for the IBM i2 Summit for a Safer Planet event on Se...
September 1-2, 2015
Organizer: IBM
Location: Washington, DC
Add Favorite
Back to Search Begin New Search