Your Place or Mine? Incoterms® Explained
Incoterms® 2010, short for the 2010 version of International Commercial Terms, are internationally accepted rules for interpreting the responsibilities of parties to a sale. They are contractual “short hand” for the Terms of Sale that define the obligations, risks, and costs of the seller and buyer for the international sale of goods without requiring the parties to negotiate every detail of common transactions. They are also w...
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer:
FEDINSIDER Location:
Albuquerque, NM
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
Top 6 Tools to Monitor Contract Performance
The Contracting Officer’s Representative (COR) has the primary responsibility for monitoring contractor performance for the Contracting Officer (CO). The COR’s influence on contract monitoring begins during acquisition planning, but once the contract is awarded the COR becomes the lead agent for contract surveillance. This webcast introduces six tools that will help you monitor contractor performance and provide timely and effectiv...
Big Data Everywhere DC
Big Data Everywhere is one-day conference focused on Hadoop and surrounding technologies that brings together users and developers to share their experience via technical sessions and user success stories. Industry experts will exchange Hadoop knowledge, share best practices, and discuss use cases and business applications. The event is a full day conference with a full breakfast, lunch, and la...
IT Security Crisis
Today’s dynamic IT environments continue to become more complex than ever before. As a result, knowing what hardware and software you have or procured, their lifecycle status, current manufacturer, Windows compatibility and Open Source exposure are key to ensuring what was initially a secure platform, does not suddenly become a major vulnerability. If you can’t describe your IT baseline accurately and immediately, you can’t p...
Government Leadership in the Data Age
The declining cost of data collection, storage, and processing coupled with ever-growing sources of digital data are spurring incremental increases in the amount of information available to government, law enforcement, intelligence, health agencies and other agencies. Big data is transforming the way we govern and live, and the Administration is taking steps to minimize potential risks such as loss of privacy, discrimination, and threats to c...
May 12, 2015
Organizer:
FEDINSIDER Location:
Washington, DC
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer:
FEDINSIDER Location:
Webcast
Fundamentals of University Export Compliance
Most export compliance training focuses on issues facing businesses. But businesses are not the only exporters; universities and other institutions of higher learning export too. The "business" of a university is to disseminate knowledge -- an objective that can be directly impacted by U.S. export control regulations. In addition to encountering many of the same ITAR, EAR and OFAC issues as companies, academic institutions face another set of...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.