Back to Search Begin New Search Save Search Auto-Notify
Predictive Force Readiness: Analytics t...
Ensuring the protection and readiness of our armed forces is a top priority. Predictive insights are critical for scenario planners to ensure mission success of generating forces: i.e., those tasked to prepare tactical forces for deployment, as well as operating forces: tactical units assigned for deployment. This spans a wide range and also includes humanitarian missions, such as delivering global aid in the case of natural disasters, global...
July 14, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
IBM Invitational Hiring Event
IBM Is Looking for Professionals with Experience in: • Actuarial Analytics Modeling Subject Matter Experts (SME) - SAS• Application Developers• Army Contracting Subject Matter Experts• Business Analysts• Business Process Management (BPM) - Specialists• Cognos Developers - TM1• Configuration Managers• Database Administrators• Database Engineers• Economic Modeling Team Leads• Financial Mana...
June 18, 2015
Organizer: IBM
Location: Tysons Corner, VA
Add Favorite
IBM Security Suite Proof of Technology
Your organization is producing more data than ever before, and it’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy, creating an era of continuous breaches. We invite you to join us for a complimentary, one-day session where we will help take your organization's security to the next level. This hands-on session will focus on IBM QRad...
June 18, 2015
Organizer: ESVA, Inc.
Location: McLean, VA
Add Favorite
Achieve Cyber Deterrence: Get to the Ro...
The majority of the focus in today's realm of cybersecurity is on the attack: where is the attack coming from, what is being attacked, what type of attack is it, and how can we learn from the attack to prevent it from happening in the future? These are all critical questions, but visionary cyber defenders are expanding their focus beyond the attack and asking who is behind it.Think about it - attacks don't just happen and malicious code doesn...
June 17, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
IBM Managed File Transfer - The Unsung...
Providing Flexibility, Reliability, Security, and Visibility for Data Movement Are file transfers important to your agency? Do you want the comfort of knowing that your files are sent successfully, securely, and on time? If you answered yes to any of the above, then please join IBM MFT/B2B Program Director, Brian Gibb for a complimentary webcast focused on optimizing your managed file transfer environment. Why Attend? Attendees will learn abou...
June 2, 2015
Organizer: ESVA, Inc.
Location: Webcast
Add Favorite
Use Advanced Machine Learning to Your A...
Has your organization experienced a security breach and didn't immediately realize it occurred? Do you need a real-time, cyber defense network-based detector that sits above or below a proxy and analyzes network traffic, both inbound and outbound, for Advanced Persistent Threats (APT) intrusion and infection detection? Join us for a one-hour webinar showcasing a solution that not only complements existing signature-based solutions, such as SIE...
May 19, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
Born-On-The-Smartphone Apps Meet Missio...
Born-On-the-Smartphone Apps Meet Mission Objectives with Regular Feedback Date: Tuesday, May 12, 2015 Time: 11am Eastern; 8am Pacific Duration: 1 HourThank you for your interest in this event, however, registration is unfortunately closed. Click here if you would like access to the archived recording.Attendees of this webinar learned how to: Mine app ratings and reviews for actionable data Process context-aware input, such as in-app bug report...
May 14, 2015
Organizer: IBM Government at ESVA Inc.
Location: Virtual
Add Favorite
Government Analytics Forum 2015
Many federal professionals know that they need to extract actionable information from the vast data repositories that their agencies maintain. Yet challenges exist in how to get at that data and use it for meaningful analysis and more informed decision-making. How can the federal workforce leverage the resources available to support its mission requirements? One way is to take advantage of the rapidly expanding set of technology and applicatio...
May 5, 2015
Organizer: IBM
Location: Washington, DC
Add Favorite
IBM Security Intelligence Workshop and...
Your organization is producing more data than ever before. It’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy. Clearly, a more responsive and integrated analytics-driven approach to security is needed. Join us for a two part security series that will give you a better understanding on how to deal with your security issues. Attend t...
April 16, 2015
Organizer: IBM Government at ESVA Inc.
Location: McLean, VA
Add Favorite
Detect Inside Threats & Eliminate Appli...
The inside threat is real - a recent study reports that "60 percent of cyber crimes are perpetrated by internal staff," and the trend is showing no signs of slowing down. How can you be sure that administrators are not siphoning off sensitive data? This is of particular concern to governmental agencies, where the free flow of information is critical to mission success and the availability and ease of acquiring proprietary, classified, or other...
April 14, 2015
Organizer: IBM Government at ESVA Inc.
Location: MacDill AFB, FL
Add Favorite
Back to Search Begin New Search