13 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
IBM Security Tools for Application Vuln...
Automated attacks on DoD information systems, especially attacks against Internet-connected systems, continue to grow at such an exponential rate that they are viewed as almost commonplace. Identifying application vulnerabilities and addressing them in a timely manner is a crucial component to maintaining a secure environment. The DoD clearly recognizes that vulnerabilities in application code and runtime web-based applications are a primary a...
June 25, 2014
Organizer: IBM Security Government at ESVA Inc.
Location: Webcast
Add Favorite
IBM's Security Intelligence and Big Dat...
Your company is producing more data than ever before. It’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy. Clearly, a more responsive, more integrated, analytics-driven approach to security is needed. Join us for a two part security series that will give you a better understanding on how to deal with your security issues. Attend the...
March 4, 2014
Organizer: IBM QRadar Government at ESVA Inc.
Location: McLean, VA
Add Favorite
Continuous Diagnostics and Mitigation:...
Continuous Diagnostics and Mitigation: How to Reduce Threats, Complexity and Cost Rebroadcast on Thursday, January 30, 2014 2:00 PM EST Duration: 1 hour The DHS Continuous Diagnostics and Mitigation program is a significant step forward for US Federal departments and agencies seeking to improve compliance and reduce risk. Many solutions focus on assessment and leave agencies figuring out how to remediate and mitigate issues using some sort of...
January 30, 2014
Organizer: Government Executive and IBM
Location: Webcast
Add Favorite
Back to Search Begin New Search