Managing and Supervising the Government...
Congress has mandated that Federal Agencies adopt telework whenever feasible. OPM has developed telework policies for the Federal workforce that mirror industry “best practices” in taking advantage of non-traditional work settings. Additionally, GSA is encouraging Federal Agencies to implement “Hoteling” as a way to reduce overall facility costs. In spite of this, there is still reluctance from many supervisors to embr...
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity The Friends Community Church and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosting a one-day Sec...
Dams Security and Protection Seminar
Dam Security and Protection Seminar (L260) Dams, levees, and related facilities are a vital part of the Nation’s infrastructure, providing a wide range of economic, environmental, and social benefits. Those benefits include hydroelectric power, river navigation, water supply, wildlife habitats, waste management, flood control, and recreation. The Dam Security and Protection Technical Seminar is designed to provide dam owners and operator...
The Mandate for Public Sector Enterpris...
Agencies are increasingly asking themselves, “What are the risks that could prevent my agency from achieving its mission and objectives?” At one time, it was enough to focus on departmental risks such as financial or operational risks for federal financial programs or acquisition and investment risks for departments and agencies that rely heavily on procurement of major systems and other support for the agency’s mission. In t...
June 30, 2015
Organizer:
FEDINSIDER Location:
Webcast
AFCEA Bethesda's 4th Annual Data Symposium
The growing data pool created by citizens sharing information in their daily lives through sensors, open data initiatives and the proliferation of the Internet of Things positions government agencies to deliver improved services and mission outcomes. The Data Symposium is focused on how government data enhances the life of the citizen. Highlights: With more than 130,000 data sets, learn out how the government currently uses data and the plans...
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer:
FEDINSIDER Location:
Webcast
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity The West Acres Shopping Center of Fargo and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosting a...
Cyber Security for Defense
Defending Cyberspace is never an easy task. In fact, it is one of the most difficult duties now facing the United States Military. How do you defend against an enemy, either foreign or homegrown, that can anonymously attack from any direction thereby potentially crippling entire units without firing a single shot? Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attack...
June 24-26, 2015
Organizer:
IDGA Location:
Augusta, GA
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.