$50K+ Value: Teaming To Win Government...
PROGRAM MATERIALS: To Promote Training, Attendees Will Receive The Following Sample Standard Forms: A Nondisclosure AgreementA Teaming AgreementA ID/IQ Subcontract AgreementA SBA Joint Venture Operating Agreement A Contractor Teaming Arrangement Agreement (“CTA”) Due to demand, early-bird prices are subject to substantial increase. Register now! OVERVIEW:Small businesses utilize several key agreements when teaming together in pursu...
Maximum Government Contracts Win Strate...
Maximum Win Strategies: Leveraging Joint Ventures To Win More, With More Small Business Administration (“SBA”) regulated joint ventures can provide a “leg up” on the competition enhancing eligibility for larger awards by adding substantial resources and performance capabilities to government contracts pursuits. However, leveraging the strategic advantage of joint ventures also involves mastering the “rules of the...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Military-Friendly Virtual Job Fair
This Corporate Gray Virtual Military-Friendly Job Fair provides military-experienced job seekers the opportunity to interview with employers nationwide via text chat and video. The event is for transitioning service members, veterans, and military spouses. Most participating employers require U.S. citizenship and cleared (or clearable) candidates for many positions. Job seekers are required to pre-register and upload their resume to participat...
Understanding FERS for Special Provisio...
An Overview of FERS for Special Provision Employees Job classifications Types of Retirement Plans Mandatory Payroll Withholdings Information on the TSP Retirement Planning Military Service Calculating Your FERS Annuity Redeposits and Deposits Minimum Retirement Ages Sick and Annual Leave Calculating Years of Service High-3 Average Salary Other Information for FERS Workers with Special Provisions The Special Retirement Supplement Best times to...
Securing AI: Cybersecurity Operations/S...
Join us for our new two-day, interactive global workshops focused on identifying opportunities and managing the risks associated with artificial intelligence. Engage with your peers as we take an in-depth, hands-on look at how to secure the use of AI and discover ways AI uses our data through a practical risk management lens. Securing AI: Cybersecurity OperationsGain essential tools to secure systems in the AI era. Learn how AI can impact both...
July 24-25, 2024
Organizer:
ISC2 Location:
Vienna, VA
Understanding Your Social Security Benefits
An Overview of the 4 Types of Social Security Benefits Retirement, disability, survivor, Medicare Eligiblity requirements for each type, How the amounts are calculated How they apply to the financial plans of federal employees, both FERS and CSRS employees Understanding the Common Pitfalls The Windfall Elimination Program for CSRS Earnings Test Special Retirement Supplement for FERS Government Pension Offsets (GPO) How the benefits are taxed I...
SecureWorld AI Virtual Conference
Live virtual conference for cybersecurity professionals to delve into the implications of artificial intelligence for the field of InfoSec. How can AI be used for defense, and how are threat actors using AI to power cyber attacks? Learn and earn 6 CPE credits in 12 informative sessions, hearing from leading voices in security and AI.
North, South, East, West: Navigating th...
Federal CIOs know the days of protecting a network perimeter are gone — firewalls were never designed to address edge computing, remote work, hybrid clouds, or multiple devices used by a single person. This is why all Federal agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. With that...
July 24, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.