Back to Search Begin New Search Save Search Auto-Notify
FAR Part 51- Use Of Government Sources...
This part prescribes policies and procedures for the use by contractors of Government supply sources and interagency fleet management system (IFMS) vehicles and related services.
Add Favorite
M&A: Understanding GovCon Novation Agreements
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
FAR Part 52- Solicitation Provisions An...
FAR Part 52 provides instruction on using provisions and clauses in solicitations and contracts, provides those provisions and clauses in full text, and presents a matrix to assist contract writers in selecting clauses applicable to their contracts.
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Call Center to Action: Splunking Your G...
Join us as we discuss how to build an integrated view of your contact center operations that will provide real time insights into what your customers are experiencing and how your applications, processes, and agents are performing. Genesys offers a best in-breed contact center as a service solution that integrates with Splunk, collecting data around conversations, missed opportunities, workforce management, and system performance. Splunk ties...
Add Favorite
AvePoint Webinar: Modernizing Governmen...
Government agencies have significantly accelerated their digital transformations in the wake of the pandemic. With AvePoint's portfolio of SaaS solutions recently receiving FedRAMP Authorization, they can continue to accelerate this transformation while ensuring their collaboration is compliant and secure. This includes an automated workspace management system to increase security and data protection across all Microsoft 365 workspaces that wi...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Securing Hybrid Learning in an Evolving...
K-12 education institutions are vulnerable to cyber-attacks and ransomware. With an increase in hybrid learning environments, education institutions have been forced to rethink their cybersecurity approach. Determining the right security solution can become quite complex for K-12 institutions given the amount of vendors in the market and the limited staff and funding. Fortunately, an intrinsic security approach simplifies your security strateg...
Add Favorite
Back to Search Begin New Search