EEOC's 18th Annual EXCEL Training Conference
In its 18th year, the EXCEL Training Conference is the premier national training conference for federal and private sector EEO managers, supervisors, practitioners, HR professionals, attorneys and ADR specialists. The employer community, both the private and public sector, will gain invaluable knowledge for making those tough HR decisions! Learn the latest EEO developments from the EEOC experts who enforce EEO laws and from other federal high...
Export Enforcement Interactive Webinar
It is true of export compliance that being an exporter means – in all probability – your company will eventually commit an export-related violation. Between the ITAR, the EAR and seemingly endless bodies of OFAC sanctions regulations, with all their complexities and ambiguities, it is frighteningly easy to run afoul of the rules. Sooner or later, you will face an export violation, or at least facts which might indicate a violation....
Asia Pacific Export Controls 2015 Update
Special Focus on Control Lists and Classification The last few months have been one of the most robust single periods of Asia export control development in a decade. There will continue to be changes as we move through 2015 and into 2016, with some countries making modifications to their existing export controls and others taking important steps to establish a national export control system for the first time. One of the biggest areas of chan...
Asia Pacific Export Controls 2015 Update
The last few months have been one of the most robust single periods of Asia export control development in a decade. There will continue to be changes as we move through 2015 and into 2016, with some countries making modifications to their existing export controls and others taking important steps to establish a national export control system for the first time. One of the biggest areas of change has been in national export control lists. Since...
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
FCPA Compliance – The Devil Is in the D...
The potential opportunities and financial rewards associated with expansion into new foreign markets can seem limitless. However, jumping into the global marketplace also brings with it new challenges and pitfalls that extend well beyond compliance with export and import clearance formalities. As corruption in international business is commonplace and even rampant in many parts of the world, the Foreign Corrupt Practices Act (“FCPA...
Vulnerability Assessment/Risk Analysis...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & R3SME [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerou...
Dams Security and Protection Seminar
Dam Security and Protection Seminar (L260) Dams, levees, and related facilities are a vital part of the Nation’s infrastructure, providing a wide range of economic, environmental, and social benefits. Those benefits include hydroelectric power, river navigation, water supply, wildlife habitats, waste management, flood control, and recreation. The Dam Security and Protection Technical Seminar is designed to provide dam owners and operator...
Encryption and Cybersecurity Export Reg...
BIS relaxes rules while proposing a wide range of new controls on “cybersecurity” products. This webinar will bring companies up to date on the latest regulations affecting exporters of products using encryption as well as discussing new and proposed rules on cyber security products. These new rules are a result of agreements made by the Wassenaar Arrangement in the past two years, as well as an ongoing US interagency review of cyb...
BIS License Application 748P: How to Pr...
The BIS form 748P is used for export licenses, re-export licenses and commodity classifications among other things. This form is the major feature of the web-based application platform used by BIS,“SNAP-R”. The need to apply for BIS 748P applications for exports and re-exports is increasing significantly largely due to Export Control Reform. If you are new to the BIS 748P application, you need to know all of the above and more if y...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.