Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
2015 Cloud Connect: Your Cloud, Your Way
Today's society is all about convenience. From cars to homes and even cloud solutions, customers demand customization and control in order to best fit their changing needs. As agencies continue to transition workloads to the cloud, Feds require flexible cloud models to better facilitate a smooth, secure migration. What should be considered when preparing to manage multiple cloud environments? What systems should an agency have in place to mana...
November 5, 2015
Organizer:
MeriTalk Location:
Washington, DC
Workforce Optimization in Government IT
Government's need for skilled technology workers is critical to address such complex national challenges as disaster response, cybersecurity and homeland security. In particular, the scarcity of trained information technology talent coupled with heavy competition from private industry for these trained individuals is a pressing issue in government. The Bureau of Labor Statistics predicts that by 2020, over 1 million programming jobs will go un...
November 5, 2015
Organizer:
FEDINSIDER Location:
Webcast
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer:
SecureAuth Location:
Arlington, VA
Phoenix EAR Export Controls / ITAR Defe...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR): This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce & Treasury. Ex...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer:
SecureAuth Location:
New York, NY
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer:
SecureAuth Location:
Boston, MA
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity University of Nebraska at Kearney, Office of Emergency Management and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homel...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.