Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP) on September 20 at 1 p.m. EST. Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and...
Effective Use of the COSO Framework (16 CPEs)
4, ba Our approach for this in-person training event is to provide the relevant information which internal control professionals will need to fulfill the "Internal Control Life Cycle" using the "top-down, risk-based" approach. We provide the background knowledge sources, advice on how to conduct risk assessments, discuss scoping, and review how to plan the assessment of an internal control framework based on COSO. Risk management activities ar...
Premier Certified Energy Manager Traini...
Held over 5 days, 33 total hours with multiple instructors. Click Here to Watch a two-minute introduction to the Virtual Format Register to attend either remotely or in a city near you. View the "Location & Schedule" tab for additional details. The Certified Energy Manager® (CEM®) Training Program focuses on optimizing energy use and costs within non-residential buildings. It explains how energy is purchased and then used in variou...
FY22 Acquiring Excess Personal Property...
GSA Personal Property Management is hosting a series of virtual training sessions on various aspects of the program. The topic of this FREE virtual training will be Acquiring Excess Personal Property directly from Federal Management Regulation (FMR) 102.36. This training will provide you with information as to who can acquire excess personal property, whether we pay for it or not, how to acquire the property via a live demonstration and more....
Becoming an Awesome New Auditor! (24 CPEs)
4, ba So, you've accepted a new position as an Internal Auditor; congratulations, and welcome to our world! Internal Auditors provide an extremely important and unique function: to independently assess controls to balance risk that may impede the objectives of an organization. We are the "last line of defense" in organizations to report risk events. Please join us for this valuable in-person, interactive training and allow our expert instructo...
Being an Audit Leader (24 CPEs)
4, ba Are your audit leadership skills working to get the job done? This in-person event is focused on helping attendees in mastering the skills necessary to efficiently lead audit teams. This course provides new leaders with the tools needed to effectively lead audit teams, while exploring the life cycle of an audit from an audit leader's perspective. "This course is not just for auditors or new audit leaders, it is for anyone who wants an un...
Forensic and Investigative Accounting (...
4, ba Forensic accounting is a specialty practice area where accounting, auditing and investigative skills are used to analyze and present information that is suitable for use in a court of law. Topics covered include fraud detection and fraud investigation techniques, valuation of closely held businesses, lost profits analyses, and various types of litigation support services. Fundamental legal concepts governing expert witness testimony are...
Think Cloud, Think GSA Part 2
Whether you need assistance with a specific part of the cloud planning process or an end-to-end assisted acquisition, GSA has the flexibility and customizability to get what you need done. Attend this interoffice showcase to understand the expertise of GSA cloud experts, the cloud products and services on offer, and most importantly, what YOUR next actions should be to get the cloud solution needed to achieve your agency’s mission. Acros...
Meeting Mandates with Identity-Driven Z...
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a zero trust architecture strategy. The purpose of the mandate is to defend against sophisticated penetrations by adversaries, whether nation-states or criminals, and it emphasized that identity management and access controls are key components. Taken together, identity and access controls mean that privileged access...
September 1, 2022
Organizer:
FEDINSIDER Location:
Webcast
Effective Use of the COSO Framework (16 CPEs)
4, ba Our approach for this in-person training event is to provide the relevant information which internal control professionals will need to fulfill the "Internal Control Life Cycle" using the "top-down, risk-based" approach. We provide the background knowledge sources, advice on how to conduct risk assessments, discuss scoping, and review how to plan the assessment of an internal control framework based on COSO. Risk management activities ar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.