343 webcasts found
+ 354 past events found
Back to Search Begin New Search Save Search Auto-Notify
M&A: Understanding GovCon Novation Agreements
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
FAR Part 52- Solicitation Provisions An...
FAR Part 52 provides instruction on using provisions and clauses in solicitations and contracts, provides those provisions and clauses in full text, and presents a matrix to assist contract writers in selecting clauses applicable to their contracts.
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Crush Your Government Contracting Sales Goals
The federal government is the world’s Fortune One Customer- it buys more than any other entity in the world. Over $450 billion is spent every year with small, medium and large companies selling every service and product imaginable. With that rich of a market, is it easy to reach sales goals? No! A newly-released third party sales benchmark study by a national organization determined: Only 7% of companies and salespeople exceed their sale...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Top 10 Questions on the Single Audit an...
While the American Rescue Plan Act (ARPA) has been passed into law and relief is already being distributed to states, counties, cities, tribes, and territories, there are still many lingering questions. One of the top questions coming up - "Will my entity be subject to a single audit?" Most likely the answer is “yes". The last thing you want your government organization to experience is audit findings and the risk of owing money to the...
Add Favorite
Using AI to Find Economic Nexus
E-commerce is the fastest-growing retail sector in the US. New firms enter the market each day, and sustained growth is expected to continue over the coming years. Nearly every state now has some form of economic nexus laws, but limited data on out-of-state businesses makes it difficult to determine who should be filing. Furthermore, resource constraints limit agencies’ ability to stand up compliance efforts to enforce relatively new req...
Add Favorite
Transforming For The Age of Digital Inv...
Every day around the world, digital data is impacting investigations. Making it intelligent and actionable is what Cellebrite's Intelligence Investigative Platform does best. With an ever-growing variety of digital devices and cloud sources producing volumes of highly valuable data, investigators need intuitive solutions and training to leverage this critical source of evidence when resources are limited. Join us on Thursday, July 29th for a l...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Powerful Water Modeling on Virtually An...
Water system design and analysis can be costly, time consuming, and challenging for municipal agencies. The combination of CAD, GIS, simulation and analysis features needed to produce a useful model usually means bouncing between different technologies and platforms. Often, it's a marginal CAD-enabled platform that requires export to a GIS platform, or a limited bolt-on tool that is tied to a GIS platform, neither supporting the iterative need...
Add Favorite
Back to Search Begin New Search