Washington, DC 2018 Reexports: ITAR / E...
Back-to-back seminars on compliance with reformed United States Export Control Laws (EAR / ITAR / OFAC). This seminar is designed to examine the impact of US regulations on the non-US parents, affiliates & subsidiaries of US-based companies, and on non-US based companies that use or resell US-origin products, components or technology. Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Fo...
San Diego: ITAR / EAR / OFAC Compliance...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
Face-to-Face Cybersecurity: CDM: New In...
Big changes are coming with the third phase of the Continuous Diagnostics and Mitigation program. Even as agencies continue to work on the first and second phases, the Department of Homeland Security and the General Services are laying the groundwork for CDM Phase 3, with its focus on providing much greater and timelier insight into what’s happening on the network—and providing the tools for rapid response and recovery. GSA has alr...
LONDON: US Export Controls for EU, UK,...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR) as they apply to UK, EU and other NON-US COMPANIES: This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the U...
Leveraging CDM DEFEND: Agile Cybersecur...
Earn 1 CEU! Nation-state, mercenary, cyber-jihadist and other adversaries continue to exploit vulnerabilities in Frankensteined legacy systems despite the growing outcry among agency and legislative leaders demanding action. Meaningful change requires tools which give agency leaders the agility, flexibility, visibility, and contract vehicles to quickly acquire new, cutting-edge cybersecurity solutions. CDM DEFEND is a powerful single award tas...
Washington, DC: ITAR / EAR / OFAC Compl...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
SINGAPORE: US Export Controls for Asia-...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR) as they apply to Asia-Pacific and other NON-US COMPANIES: This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by...
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
Using Building Design to Reduce the Eff...
Based on the assumption that preventive measures must be in place to be effective, students learn 25 mitigation strategies that when successfully applied reduce the impact of terrorist attack. We examine the current state of terrorism in the United States, its evolving nature and the future use of weapons of mass destruction. A variety of options are explored for addressing the most common manmade threats we face today and for the foreseeable...
Defense Systems Summit
THE INTERSECTION OF DEFENSE IT AND DEFENSE READINESS IT is essential to readiness. Cloud, network modernization, analytics, mobility, and related technologies are reshaping how the military services and supporting agencies manage core operations and deliver mission-critical services. These technologies also provide an opportunity to reengineer those operations and services to create a much more agile and responsive IT environment—one tha...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.