ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Effective Market Research using Market...
In this course, you will learn why market research is conducted, when and how to conduct market research; the regulatory nature of FAR Part 10 and how it ties into other decisions such as acquisition planning (Part 7) small business set-asides, commercial items, contract type selection and more, and how to get better results by making your data collection methods easier. The course will use real life scenarios, examples from GSA’s market...
ICIT Virtual Briefing | Fireside Chat w...
Join us for this fireside chat where Nic Chaillan, former Chief Software Officer for the US Air Force, and Gary Barlet, Federal Field CTO for Illumio, discuss the EO's implementation, how the private sector responded to the request for support, and ongoing implementation needs and challenges. May 2022 marks the 1st anniversary of Executive Order 14028: Improving the Nation's Cybersecurity" which tasked Government agencies with adopting best pr...
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
The CALC+ Pricing Suite ATRW Summer
Acquisition Training for the Real World (ATRW) Summer FY22 7/27/2022: The CALC+ Pricing Suite : Learn how the CALC+ tool works. Where does the data come from? How is the CALC+ pricing suite different from legacy CALC and PET tools? See a demo of the latest updates on the CALC+ Quick Rate Tool and how you can use it to improve your acquisitions.
The Potential of AI for State and Local...
For states and localities looking to automate repetitious work, reduce paper-based tasks and streamline processes, artificial intelligence (AI) holds a lot of promise. The National Association of State CIOs (NASCIO) in their recent report on AI and machine learning drew upon a Deloitte assessment that categorized the benefits of automation into four groups: relieve, split up, replace, and augment. The challenge for state and local agencies is...
July 27, 2022
Organizer:
FEDINSIDER Location:
Webcast
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
Virtual Leadership Summit III
Mark your calendars for the next evolution in FEW’s training program, the Virtual Leadership Summit III (VLS III). FEW will host its third year of virtual training July 18 – 22, 2022, with no per diem or lodging cost required. Once again, FEW will explore the vast options available through an interactive platform to connect you with our trainers, sponsors, and colleagues. As the nation deals with the global pandemic, FEW will conti...
EC-Council Ethical Hacker Training - Ba...
The Certified Ethical Hacker certification is one of the most sought-after cybersecurity certifications around the globe. Organizations like the DoD and ANSI have endorsed and/or accredited the CEH course. Want to Master CEH? This program incorporates instruction and practice to get students ready to take the CEH certification exam as well as the CEH Practical Exam. Candidates who successfully pass both exams earn the CEH Master credential as...
July 18-22, 2022
Organizer:
EC-Council Location:
Baltimore, MD
Stronger Together: How to Empower Feder...
Cyberthreats and breaches can be detrimental to the safety of the American people. In a recent study by the Washington Post, IT and cybersecurity experts state that the Federal agencies are more vulnerable to threats and attacks than before. The last five years have seen an increase in the success of Federal agencies’ cybersecurity due to legislation and funding. However, the threats that we are now facing have advanced in the five years...
July 21, 2022
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.