WNG Government Relations Networking Reception
About this Event: This networking reception is convened by the WNG Government Roundtable and is designed for government relations professionals in the greater Washington, D.C. region. The event presents a networking and marketing opportunity for both professionals and companies to increase awareness of their services. Who Should Attend: Government relations professionals, lobbyists, corporate representatives; the diplomatic community; governme...
May 27, 2010
Organizer:
WNG Location:
Washington, DC
USSTRATCOM Cyberspace Symposium
Why should you attend this symposium? 1. Top Leadership. Confirmed speakers include: Rick Sheehy Lieutenant Governor of Nebraska Gen Kevin P. Chilton, USAF Commander U.S. Strategic Command LTG Keith Alexander, USA Director National Security Agency Mr. Scott Charney Corporate Vice President, Trustworthy Computing Microsoft Corporation 2. Inspired Agenda. Two-day agenda -- focused panel discussions and featured speakers. 3. Forward-Thinking Con...
Critical Roles and Responsibilities of...
The contracting officer’s representative (COR/COTR) plays an essential role in the planning, awarding and management of the government contract. They are the “eyes and ears” of the contracting officer in ensuring that technical requirements are being met and that the contractor is adhering to the terms and scope of the contract. Their technical expertise and project management skills are critical in designing performance-base...
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
Meet agency directives and regulations...
Delivering a secure and reliable IT environment requires automated IT Change and Configuration Management. Meet the demands of regulations and agency directives like VA Directive 6500, FISMA, FIPS 200, & NIST SP 800-53 with ChangeGear from SunView Software. Learn how the ChangeGear solution simplifies the implementation of IT controls and helps you meet the key provisions of today's federal regulations. With automated approvals and notific...
OmniGov Training Institute’s EEO Wednesdays
TOPIC: Informally Resolve More Cases! If you are an EEO Counselor or other EEO professional involved in informally resolving dispute, you won't want to miss this discussion. Participants will learn about their role as a facilitator and how they can get the parties to talk about what is REALLY bothering them. Participants will be able to articulate to the parties of the dispute the true benefits of informal resolution, talk them through the man...
Video Bootcamp
Video Bootcamp Class Format: Two–Day Course Instructor: Michael Rosenblum, Rosenblum TV Date: Tuesday – Wednesday, May 25 – 26, 2010 Time: 9:00 am – 6:00 pm NOTE: the time of this course is LONGER than other two–day WMU courses. Place: Mathematical Association of America Carriage House Conference Center Washington, DCDirections to MAA Fee: $1,950 federal, state, or local U.S. government; $2,925 for non–gover...
The Changing Landscape of International...
Michael J. Penders, Esq., President of Environmental Security International will convene Security and Sustainability Forum's May live webcast from Washington DC on International Standards for Supply Chains and innovations in safety, sustainability, and security. Included in this webcast will be discussions on water and agriculture supply. Large and small businesses in this rapidly growing industry will benefit as Penders brings experts togethe...
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.