Cornerstones of ITAR Compliance: Contro...
The USML has changed in major ways over the past several years –it can’t hurt to take a fresh look... This webinar will guide you through the questions, and possible issues, you need to address when you are determining how the International Traffic in Arms Regulations (ITAR) apply to an activity you may be looking to proceed with. The ITAR comes into play when you have both an activity that the US government wants to control and y...
The GAO Green Book Training Seminar
A Practical Approach to The Green Book Compliance The Green Book sets the standards for an effective internal control system for federal agencies, and is a crucial safeguard over public resources. State, local, and quasi-governmental entities, as well as not-for-profit organizations, may adopt the new Green Book standards as a framework for an internal control system. This one-day CPE seminar provides an overview of the principles-based Green...
Government Cloud Strategies: What to Know
Cloud technologies are critical to keeping pace with innovation and securing America’s technical advantage. Cloud enables leading edge solutions for federal and military agency missions; ranging from improved citizen services and safety to protecting our warfighters and national security. The importance of cloud to government is evident in the recently-released Department of Defense Cloud Strategy as well as the Office of Management and...
Intellectual Property Issues in Governm...
For many government contracts, the allocation of intellectual property rights is the most critical issue both parties will face. In this 90 minute webinar, an experienced government procurement attorney will survey critical government contract intellectual property issues. The course will address: The different types of intellectual property, including differences between commercial and government contract IPTechnical data rights: how they ar...
How to Learn to Love Networking
By now you’ve heard a million times that networking is key to getting ahead in your career. But really very few people LOVE to network, so what are rest of us supposed to do? Instead of fumbling with conversation starters or only talking to people you already know, join GovLoop and your government peers after work on Tuesday, February 26, from 5:30-8:30 pm for an interactive, in-person GovUp. We’ll explain how everyone from introve...
February 26, 2019
Organizer:
GovLoop Location:
Washington, DC
Handling Voluntary Disclosures and Inte...
How would YOU handle an investigation into a potential violation of the ITAR and EAR? This webinar provides strategies for just such an event!The purpose of an export compliance program is to catch potential violations before they happen. However, sometimes a potential violation is not identified until after an incident has already taken place. Additionally, the significant and ongoing regulatory revisions to the ITAR and EAR have added to th...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
Washington Technology Power Breakfast
Register today for Washington Technology's Power Breakfast taking place on February 22nd. At this morning event, leading executives in the government market will discuss strategies they are deploying to capture new business and maintain their position in the government. They'll also discuss the opportunities and challenges companies are facing. Don't miss the exclusive presentation of Washington Technology's 2019 Contractor Confidence and Outl...
CDM & Eggs
From DEFEND and .govCar, to the RFS process and AWARE, the CDM program constantly evolves to meet the cybersecurity needs of Federal agencies. And with growing concerns around cloud and security, the CDM program will expand its capabilities beyond the perimeter in FY19. Join MeriTalk and Federal cybersecurity experts on February 21 for the CDM & Eggs government-only roundtable breakfast to discuss the path forward for CDM program in FY19 a...
February 21, 2019
Organizer:
MeriTalk Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.