A PRACTICAL GUIDE TO THE INCURRED COST...
Who should attend: CFOs, Directors, Managers in functional areas of Contract Administration, Accounting, Finance, Compliance and Consulting. Any organization who are required to submit their incurred costs to the Federal Government What you will learn: Government contractors subject to an Allowable Cost and Payment contract clause must submit an adequate incurred cost proposal together with supporting data for each fiscal year within six month...
Bureau of Indian Affairs' New Right-of-...
Are you up-to-date with the new regulations of the Bureau of Indian Affairs' Right-of-Way? The new Bureau of Indian Affairs' Right-of-Way regulations have a considerable impact throughout Indian country, for both tribes and businesses involved in negotiations and economic opportunities on tribal lands. This topic will provide you with an overview of the Bureau of Indian Affairs' New Right-of-Way requirements. The new regulations will be compar...
Quality by Design using Design of Exper...
This seminar focuses on how to establish a systematic approach to pharmaceutical development that is defined by Quality-by-Design (QbD) principles using design of experiments (DOE). In addition, this course teaches the application of statistics for setting specifications, assessing measurement systems (assays), developing a control plan as part of a risk management strategy, and ensuring process control/capability. All concepts are taught with...
The Smart City: Delivering Services, In...
This year, 1.6 billion connected things were in use by smart cities, a 39% increase from 2015. Gartner defines a smart city as an urbanized area where multiple sectors cooperate to achieve sustainable outcomes through the analysis of contextual, real-time information shared among sector-specific information and operational technology systems. The result is a call for education, entrepreneurship, and innovation to help transform the ultra-conne...
February 2, 2017
Organizer:
FEDINSIDER Location:
Webcast
Government Workforce Analytics: Insight...
The strength of our country depends on a strong military and an effective government. The chain of command needs visibility to all aspects of force readiness from recruiting, education, and promotions to details on awards, passports, visas, personnel and legal matters. How can agencies break down data barriers to achieve a 360 degree view of their workforce? This webinar will explore how to use data to capture and report on the current state o...
February 1, 2017
Organizer:
FEDINSIDER Location:
Webcast
Private Access to Public Right of Ways
Learn about key issues including keeping trespassers off utility or other easements. This topic will include legal and practical advice on identifying the priorities in land rights and responsibilities regarding easements and rights of way as the dominant estate and as to competing interests with respect thereto. Whether the servient estate holders, other easement holders or other third parties, determining what can, may and can't be done on t...
SANS Cyber Threat Intelligence Summit ...
Join SANS at this innovative Summit as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. Most organizations are familiar with threat intelligence, but have no real concept of how to create and produce proper intelligence. The 2017 Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization....
January 25 - February 1, 2017
Organizer:
SANS Institute Location:
Arlington, VA
Contractors' Purchasing System Reviews...
Upon completion of this course, the participant should have adequate knowledge of the background and requirements related to the CPSR. Further, the participant should have a basic understanding of policies, procedures and practices required to comply with the requirements. We will highlight recent developments in the CPSR environment from the Defense Contract Management Agency’s perspective and cover new regulations and statues. Further,...
Virtual Session: Top Privacy Issues for...
For decades, information security functions have fought for the responsibility to monitor the flow of information through the organization, in paper and digital formats, throughout its entire life cycle, and to determine the existence and accuracy of data classification. This effort has largely been successful. However, if all data flows through security’s filters, it is incumbent upon security professionals to implement the proper cont...
Fraud Analytics For Government
Best Practices in Using Data Analytics to Detect and Prevent Fraud and Improper Payments Fraud Detection: Identify where fraud is most likely occurring - and ways to improve internal controls to prevent it Improper Payments: Use data analytics to uncover which payments are likely improper and recover those funds Benefits And Procurement Fraud: Examine specialized strategies for detecting and preventing fraud in a variety of benefit programs an...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.