Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
November 2-6, 2015
Organizer: Federal Publications Seminars
Location: McLean, VA
Add Favorite
2015 Cloud Connect: Your Cloud, Your Way
Today's society is all about convenience. From cars to homes and even cloud solutions, customers demand customization and control in order to best fit their changing needs. As agencies continue to transition workloads to the cloud, Feds require flexible cloud models to better facilitate a smooth, secure migration. What should be considered when preparing to manage multiple cloud environments? What systems should an agency have in place to mana...
November 5, 2015
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Workforce Optimization in Government IT
Government's need for skilled technology workers is critical to address such complex national challenges as disaster response, cybersecurity and homeland security. In particular, the scarcity of trained information technology talent coupled with heavy competition from private industry for these trained individuals is a pressing issue in government. The Bureau of Labor Statistics predicts that by 2020, over 1 million programming jobs will go un...
November 5, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer: SecureAuth
Location: Arlington, VA
Add Favorite
Phoenix EAR Export Controls / ITAR Defe...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR): This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce & Treasury. Ex...
November 2-5, 2015
Organizer: Export Compliance Training Institute
Location: Phoenix, AZ
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer: SecureAuth
Location: New York, NY
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer: SecureAuth
Location: Boston, MA
Add Favorite
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity University of Nebraska at Kearney, Office of Emergency Management and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homel...
November 2, 2015
Organizer: Department of Homeland Security
Location: Kearney, NE
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
October 26-30, 2015
Organizer: American Management Association
Location: Atlanta, GA
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
October 29, 2015
Organizer: American Management Association
Location: Atlanta, GA
Add Favorite
Back to Search Begin New Search