SlideShare a Scribd company logo
Crisis Mappers Webinar:
          Analytics for Conflict Mapping
          and Crisis Response

          Dec. 14, 2012, 12-1pm EST

          Featuring GeoEye’s Dr. Colleen McCue



  Why just count incidents when you can
 anticipate and respond more effectively?


                 How to register:
http://www.geotime.com/News-Events/Webinars.aspx
Webinar Preview
How do Pop Tarts, the Lord’s Resistance Army and Silence
   of the Lambs tie into operational security analytics?
GeoEye’s Dr. Colleen McCue will fill you in on December 14!




During this webinar you will learn about:
• “Best practices” related to data and analysis that are pulled from the larger data
  science community
• Operational security analytics and crime analysis as a process that can
  incorporate novel data sources, technology, and tradecraft
• The unique requirements and constraints of humanitarian mapping and crisis
  response, including privacy and security of the data and related analytic output

More Related Content

Viewers also liked

La belle bleue
La belle bleueLa belle bleue
La belle bleue
Éric NIAKISSA
 
Mi madre es la mejor
Mi madre es la mejorMi madre es la mejor
Mi madre es la mejorgongared
 
Delivering Clear Insight through the Use of Earth Imagery within GIS
Delivering Clear Insight through the Use of Earth Imagery within GIS Delivering Clear Insight through the Use of Earth Imagery within GIS
Delivering Clear Insight through the Use of Earth Imagery within GIS
DigitalGlobe
 
Learn About the Google / GeoEye Insurance Solution Set - Webinar Slides
Learn About the Google / GeoEye Insurance Solution Set - Webinar SlidesLearn About the Google / GeoEye Insurance Solution Set - Webinar Slides
Learn About the Google / GeoEye Insurance Solution Set - Webinar Slides
DigitalGlobe
 
PlanetObserver - Produits de communication
PlanetObserver - Produits de communicationPlanetObserver - Produits de communication
PlanetObserver - Produits de communication
PlanetObserver
 
Seeing a Better World
Seeing a Better WorldSeeing a Better World
Seeing a Better World
DigitalGlobe
 
Historic Flooding in CO. Big Thompson Canyon - September 2013
Historic Flooding in CO. Big Thompson Canyon - September 2013Historic Flooding in CO. Big Thompson Canyon - September 2013
Historic Flooding in CO. Big Thompson Canyon - September 2013
DigitalGlobe
 
GeoEye Presentation for the White House's "Global Development Data Jam"
GeoEye Presentation for the White House's "Global Development Data Jam"GeoEye Presentation for the White House's "Global Development Data Jam"
GeoEye Presentation for the White House's "Global Development Data Jam"
DigitalGlobe
 
Cikisi - Product Presentation - 2017
Cikisi - Product Presentation - 2017Cikisi - Product Presentation - 2017
Cikisi - Product Presentation - 2017
Ludovic Daix
 
Rotterdam Oil Refinery WorldView-3 40 cm Report
Rotterdam Oil Refinery WorldView-3 40 cm ReportRotterdam Oil Refinery WorldView-3 40 cm Report
Rotterdam Oil Refinery WorldView-3 40 cm ReportDigitalGlobe
 
WorldView-3 30 cm sample imagery
WorldView-3 30 cm sample imageryWorldView-3 30 cm sample imagery
WorldView-3 30 cm sample imagery
DigitalGlobe
 
Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...
Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...
Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...
Global Financing Facility in support of Every Woman Every Child
 
Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...
Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...
Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...
DigitalGlobe
 
CARE France : Urgence Corne de l'Afrique
CARE France : Urgence Corne de l'AfriqueCARE France : Urgence Corne de l'Afrique
CARE France : Urgence Corne de l'Afrique
CARE France
 

Viewers also liked (15)

La belle bleue
La belle bleueLa belle bleue
La belle bleue
 
Mi madre es la mejor
Mi madre es la mejorMi madre es la mejor
Mi madre es la mejor
 
Delivering Clear Insight through the Use of Earth Imagery within GIS
Delivering Clear Insight through the Use of Earth Imagery within GIS Delivering Clear Insight through the Use of Earth Imagery within GIS
Delivering Clear Insight through the Use of Earth Imagery within GIS
 
Learn About the Google / GeoEye Insurance Solution Set - Webinar Slides
Learn About the Google / GeoEye Insurance Solution Set - Webinar SlidesLearn About the Google / GeoEye Insurance Solution Set - Webinar Slides
Learn About the Google / GeoEye Insurance Solution Set - Webinar Slides
 
PlanetObserver - Produits de communication
PlanetObserver - Produits de communicationPlanetObserver - Produits de communication
PlanetObserver - Produits de communication
 
Seeing a Better World
Seeing a Better WorldSeeing a Better World
Seeing a Better World
 
La Republique du Kenya
La Republique du KenyaLa Republique du Kenya
La Republique du Kenya
 
Historic Flooding in CO. Big Thompson Canyon - September 2013
Historic Flooding in CO. Big Thompson Canyon - September 2013Historic Flooding in CO. Big Thompson Canyon - September 2013
Historic Flooding in CO. Big Thompson Canyon - September 2013
 
GeoEye Presentation for the White House's "Global Development Data Jam"
GeoEye Presentation for the White House's "Global Development Data Jam"GeoEye Presentation for the White House's "Global Development Data Jam"
GeoEye Presentation for the White House's "Global Development Data Jam"
 
Cikisi - Product Presentation - 2017
Cikisi - Product Presentation - 2017Cikisi - Product Presentation - 2017
Cikisi - Product Presentation - 2017
 
Rotterdam Oil Refinery WorldView-3 40 cm Report
Rotterdam Oil Refinery WorldView-3 40 cm ReportRotterdam Oil Refinery WorldView-3 40 cm Report
Rotterdam Oil Refinery WorldView-3 40 cm Report
 
WorldView-3 30 cm sample imagery
WorldView-3 30 cm sample imageryWorldView-3 30 cm sample imagery
WorldView-3 30 cm sample imagery
 
Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...
Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...
Atelier sur le Mécanisme de Financement Mondial en soutien à Chaque Femme Cha...
 
Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...
Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...
Bringing Innovation to Global Humanitarian Efforts through Human Geography & ...
 
CARE France : Urgence Corne de l'Afrique
CARE France : Urgence Corne de l'AfriqueCARE France : Urgence Corne de l'Afrique
CARE France : Urgence Corne de l'Afrique
 

Similar to Crisis Mappers Webinar Preview

Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Greg Makowski
 
Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater
AlleneMcclendon878
 
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
Chad Lawler
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisAn_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisMicheal Walsh
 
Asking Why
Asking WhyAsking Why
Asking Why
Datascope
 
The Nuts and Bolts of Disaster Recovery
The Nuts and Bolts of Disaster RecoveryThe Nuts and Bolts of Disaster Recovery
The Nuts and Bolts of Disaster Recovery
InnoTech
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressVera Trubacheva
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI ArticleShannon Copeland
 
Why data matters webinar
Why data matters webinarWhy data matters webinar
Why data matters webinar
Association for Project Management
 
BioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfairBioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfairYoanne Clovis
 
FAIR data_ Superior data visibility and reuse without warehousing.pdf
FAIR data_ Superior data visibility and reuse without warehousing.pdfFAIR data_ Superior data visibility and reuse without warehousing.pdf
FAIR data_ Superior data visibility and reuse without warehousing.pdf
Alan Morrison
 
Towards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into actionTowards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into action
Mindtrek
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
cscpconf
 
Odin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_PredictionOdin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_Prediction
Minh Nguyen
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013
subramanian K
 

Similar to Crisis Mappers Webinar Preview (20)

Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...
 
Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater
 
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisAn_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
 
Asking Why
Asking WhyAsking Why
Asking Why
 
The Nuts and Bolts of Disaster Recovery
The Nuts and Bolts of Disaster RecoveryThe Nuts and Bolts of Disaster Recovery
The Nuts and Bolts of Disaster Recovery
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
 
Sem 003
Sem 003Sem 003
Sem 003
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI Article
 
Why data matters webinar
Why data matters webinarWhy data matters webinar
Why data matters webinar
 
BioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfairBioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfair
 
FAIR data_ Superior data visibility and reuse without warehousing.pdf
FAIR data_ Superior data visibility and reuse without warehousing.pdfFAIR data_ Superior data visibility and reuse without warehousing.pdf
FAIR data_ Superior data visibility and reuse without warehousing.pdf
 
Towards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into actionTowards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into action
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Odin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_PredictionOdin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_Prediction
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

Crisis Mappers Webinar Preview

  • 1. Crisis Mappers Webinar: Analytics for Conflict Mapping and Crisis Response Dec. 14, 2012, 12-1pm EST Featuring GeoEye’s Dr. Colleen McCue Why just count incidents when you can anticipate and respond more effectively? How to register: http://www.geotime.com/News-Events/Webinars.aspx
  • 2. Webinar Preview How do Pop Tarts, the Lord’s Resistance Army and Silence of the Lambs tie into operational security analytics? GeoEye’s Dr. Colleen McCue will fill you in on December 14! During this webinar you will learn about: • “Best practices” related to data and analysis that are pulled from the larger data science community • Operational security analytics and crime analysis as a process that can incorporate novel data sources, technology, and tradecraft • The unique requirements and constraints of humanitarian mapping and crisis response, including privacy and security of the data and related analytic output