Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance.The word cybersecurity is thrown around, used and abused to scare people into buying...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
Cybersecurity Leadership and Governance
The word cybersecurity is thrown around, used and abused to scare people into buying more technology and tools. Yet the most important element of cybersecurity is the leadership of people and creating a culture that supports protecting your business. A study done by IBM noted that 95% of successful cyber-attacks came down to people. This session helps you understand how to structure your basic digital strategy to begin to implement a strong cy...
How to Meet the Workforce Requirements...
The president issued an executive order (EO) on March 17, 2017 which requires agencies to plan and implement long-term workforce reductions and incorporate the plan as a government-wide workforce priority into their Agency Strategic Plan and/or Human Capital Operating Plan. This Potomac Forum training workshop for government will provide information for agency executives, managers, and staff to respond to the EO. Experienced human capital exe...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
National Preparedness: Countermeasures...
Our nation’s preparedness against chemical, biological, radiological, nuclear and explosive threats (CBRNE) hinges on improved threat awareness, advanced surveillance and detection, and responsive countermeasures. This video webinar will explore awareness, prevention, preparedness and response to CBRNE and how agencies are working together for the protection of life, health, property and commerce. Learning Objectives Define the strategie...
June 28, 2017
Organizer:
FEDINSIDER Location:
Webcast
Contract Changes Pitfalls to Avoid
Contract changes present a number of challenges to the contract administrator—on both the buying and selling sides. This webinar will identify several common issues that often arise, including out-of-scope changes, unpriced changes, and de-scoping the contract effort. Takeaways: What changes may and may not be made to a contract. How to respond to unpriced change orders. Negotiating equitable adjustments.
Cybersecurity Leadership and Governance
Scope: The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Delivery: Live Online Instructor Led Session in a Virtual Classroom Purpose:...
19 Essential Ways Export and Security a...
As an export compliance professional there are a wide variety of ways that you might find yourself needing to work closely with, and understanding the function of, your security department. This webinar is designed to strengthen your knowledge and build bridges between your export compliance and security departments. In order to do your job effectively, you need to work together with your counterpart in security. Your missions are the same, to...
Making Lemonade Out of Consent Agreemen...
Why They Happen, How to Avoid Them, and What to Do if They Happen to You May 9, 2017 1:00-2:30 PM EDT Consent agreements are a feared, but recurring feature of the export control and enforcement landscape. The recent announcement of the ZTE consent agreement signals that the Trump Administration has not stepped away from this enforcement option and, in fact, is willing to apply it to new issue areas and regulatory regimes in order to further A...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.