Building a Robust Threat Management System
The U.S. government ranks near the top of the global target list for hackers, and threats have become increasingly sophisticated. Federal executives are expected to protect their assets from millions of threats each day. As attacks have become more sophisticated, so have defenses. And cybersecurity is at the top of the priority and funding list across all areas of government. This FCW workshop brings together government and industry to discuss...
Cornerstones of ITAR Compliance: Licens...
There's a right way and a wrong way to do everything...this couldn't be truer than in the case of Licenses and Agreements! In this webinar we will tackle the Department of State’s licenses and agreements. If you are exporting hardware or technical data subject to the International Traffic in Arms Regulations (ITAR), odds are you will eventually need to complete a license (DSP-5 to be exact). Do it right and you will save time, money, and...
The GAO Green Book Training Seminar
A Practical Approach to The Green Book Compliance The Green Book sets the standards for an effective internal control system for federal agencies, and is a crucial safeguard over public resources. State, local, and quasi-governmental entities, as well as not-for-profit organizations, may adopt the new Green Book standards as a framework for an internal control system. This one-day CPE seminar provides an overview of the principles-based Green...
The GAO Green Book Training Seminar
A Practical Approach to The Green Book Compliance The Green Book sets the standards for an effective internal control system for federal agencies, and is a crucial safeguard over public resources. State, local, and quasi-governmental entities, as well as not-for-profit organizations, may adopt the new Green Book standards as a framework for an internal control system. This one-day CPE seminar provides an overview of the principles-based Green...
Becoming an Effective Public Speaker
While public speaking can be intimidating, it is a skill just like any other that can be practiced and perfected. Learning about best practices can reduce anxiety and make one a more engaging and effective speaker, with the presence to authentically connect with any audience. Join NextGen online on Wednesday, March 13 at 2:00 p.m. ET/11 a.m. PT to hear from experts who can help you transform into a confident and successful public speaker, no m...
March 13, 2019
Organizer:
GovLoop Location:
Webcast
NARFE's LEGcon19
Now more than ever, on the heels of the nation’s longest government shutdown, it’s imperative that the federal community build relationships with new and seasoned legislators and congressional staff to position NARFE as the go-to resource for the federal community. Register for LEGcon19 today to represent the federal community and address NARFE’s legislative priorities with the new Congress.Together, we can rewrite the tired...
March 10-13, 2019
Organizer:
NARFE Location:
Ale, VA
Accounting Compliance for Government Co...
There is accounting…and then there is Government contract accounting. Cost-based government contractors are subject to a wide range of unique accounting regulations such as Cost Accounting Standards (“CAS”) and FAR contract cost principles. While CAS and FAR are based on Generally Accepted Accounting Principles (“GAAP”), major differences abound. Without an adequate system in place, a contractor may be faced with...
Information Technology General Controls
Learn the best practices for Information Technology governance, management, security, control and auditing under COBIT and COSO 2013. This is a one-day CPE seminar designed to provide an understanding of an effective program for the creation of a system of internal control within Information Technology (IT). We use the COBIT framework as our basis for the control groups and assessment is under COSO 2013. It was created to allow organizations t...
DIY Encryption Classification 2019 Edit...
All registrants receive an encryption classification questionnaire! Back by popular demand…with a sneak peek at changes that may be coming later in 2019!We are offering a webinar on creating your own encryption questionnaires to use to classify your products, with special guidance from the instructor on the template, as well as how to customize it for companies in different industries. We will work through case studies involving produ...
TBM Executive Foundation Course
Improve your business acumen by taking the first-ever education program specifically designed for tomorrow’s business-minded technology leaders. The TBM Executive Foundation course provides senior IT leaders and finance managers the essential knowledge that drives business transformation within IT by running a successful Technology Business Management (TBM) program. Over 1600 IT and Finance leaders have already participated in the course...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.