Harassment and Bullying in the Federal...
Bullying and discriminatory harassment claims are complex, and they can get your agency in a lot of trouble if they aren’t handled correctly. Let federal EEO expert Oliver Allen guide you through the steps to improve your approach to harassment and bullying so you can save your agency time and money. With Mr. Allen’s guidance, you will learn to form the proper response to harassment claims and reduce liability. You’ll discove...
Improve TIC Performance and Security wi...
Federal CIOs recognize the need to develop “zero-trust” networks — designed around the assumption that every user and every session on the network poses a risk for data compromise. That means finding a way forward, beyond trusted internet connections (TIC) and other perimeter defenses. Find out how agencies are augmenting their infrastructure, using new generation cloud tools, to easily manage network micro-services to govern...
January 16, 2018
Organizer:
FedScoop Location:
Webcast
SANS Security East 2018
Kick start the new year with our first live training event of 2018! Please join us in New Orleans for SANS Security East 2018 (Jan 8-13), and experience exceptional cyber security training designed to help you advance your career. SANS’ training is unrivaled in the industry, and our passionate instructors are leading industry experts and practitioners. Their practical expertise adds value to the training material, ensuring you will be ab...
January 8-13, 2018
Organizer:
SANS Institute Location:
New Orleans, LA
Pricing Webinar Series
NCMA will be hosting its first "Spotlight on Pricing" webinar series. Participants earn 4.5 CPE/CLP credits for the webinar series and 1.5 CPE/CLP credits for the individual webinars. Save money by purchasing a webinar package of two or more. There is no limit to the number of people who can participate in each webinar. This discounted series allows an entire staff to be trained for one low cost, and with unlimited access to the webinar stream...
Common Pitfalls of the Service Contract...
The regulations implementing the Service Contract Labor Standards (formerly known as the “Service Contract Act”) are complex and often misunderstood—especially since the requirement guidelines are complicated and difficult to navigate. Potential penalties for violations are severe, including default termination and debarment. In addition, a contractor’s failure to correctly understand the statute when preparing bid pric...
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
Ugly Christmas Sweater Cyber Smoke Pres...
It's time to kick of the Holiday Season in style with your government and industry information management and technology colleagues at the 2017 Ugly Christmas Sweater Cyber Smoke Event presented by Intelvative in partnership with AFFIRM. The 2017 Cyber Smoke Series is sponsored by Acquia, Bromium, Crowdstrike, Cylance, Cynergy, FireEye, Forescout, One Identity, Symantec, Tanium, Tenable, and Trustwave The deck at Morton's will be open to enjoy...
December 14, 2017
Organizer:
AFFIRM Location:
Washington, DC
Predictive Analytics: Failure to Launch
How to Get Analytic Modeling Off the Ground and Into Orbit The vast majority of BI professionals and big data enthusiasts are excited about the prospects of predictive analytics and data mining, but are fully mystified about where to begin or even how to prepare. Of those who did initiate a modeling initiative, an industry survey of predictive modeling practitioners reported that 51% of data mining projects either never left the ground, did no...
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
Unlock the True Value of Cloud
Federal agencies are under increasing pressure to modernize their legacy systems and applications. And while substantial progress has been made in moving to basic cloud infrastructure-as-a-service, "lift and shift" is not enough. To truly transform, agencies must look beyond IaaS and leverage the cloud's potential to deliver entirely new business and mission capabilities. Register today to attend this forward-looking and mission-focused event...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.