The GAO Green Book Training Seminar
A Practical Approach to The Green Book Compliance The Green Book sets the standards for an effective internal control system for federal agencies, and is a crucial safeguard over public resources. State, local, and quasi-governmental entities, as well as not-for-profit organizations, may adopt the new Green Book standards as a framework for an internal control system. This one-day CPE seminar provides an overview of the principles-based Green...
24th Annual Government Contracting Conference
In this ever-changing environment, the path towards growth and success is not always clear. Attend DHG’s 24th Annual Government Contracting Conference to help position your business for success. We will provide the most up-to-date information, materials, industry insights and experience to help you stay ahead of the competition. This conference will cover various topics including cybersecurity, DCAA update, protests, DoD business systems...
Google Cloud Federal Healthcare Day
The Federal Healthcare Day is designed to help attendees explore the game-changing tech behind many of the health IT’s most transformative developments. Join us on May 2 to hear directly from government health technology leaders and Google Cloud experts, experience demonstrations of innovative platforms and network with peers. Join us as we convene speakers from the Veterans Health Administration, National Institutes of Health, and more!
London: US Export Controls for EU, UK,...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR) as they apply to NON-US COMPANIES: This seminar series provides both novice and experienced export compliance professionals with an in-depth education on compliance with International Traffic in Arms Regulations (ITAR),...
The Hows and Whys of High Fidelity Bro/...
*Attend & receive 1 (ISC)2 CPE credit! Join Corelight and Carahsoft on May 1st for a presentation on how to leverage "Bro/Zeek" data during cyber investigations. The modern Security Operations Center (SOC) consumes an immense amount of data, however not all of it is useful during an investigation. In fact, the data often comes from a number of disparate sources with little to no correlation except time. This places a heavy burden on cybers...
Protecting Your Agency's Applications,...
Your journey to the cloud has many drivers – accelerate modernization of your IT, scale beyond the limitations of your data center and innovate faster with cloud-native tools and services. Don’t let security and compliance concerns slow you down. Join Google Cloud and Palo Alto Networks to learn how state and local governments can leverage the benefits of Google Cloud Platform (GCP) while maintaining a zero-trust security posture o...
Zero Trust: Moving Beyond Perimeter Security
Roughly five years ago, John Kindervag, security thought leader and former Forrester analyst, proposed a solution that he termed “Zero Trust.” The principle behind it is quite simple, but very powerful: Trust is not an attribute of location. You shouldn’t trust something simply because it is behind your firewall. Instead, you should take a very pessimistic view on security where every machine, user, and server should be untru...
April 30, 2019
Organizer:
FEDINSIDER Location:
Arlington, VA
How to Get Promoted
Getting to that next phase of your career is HARD. In order to move up, you will either need to interview for a brand-new job, or advocate with your manager for a promotion. So, what exactly are the steps to get from where you are now to where you want to be? Join GovLoop, NextGen and your government peers after work on Tuesday, April 30 from 5:30-8:30 p.m. for an interactive, in-person GovUp at the GovLoop office in downtown Washington, D.C....
April 30, 2019
Organizer:
GovLoop Location:
Washington, DC
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
Preparing for CTPAT Seminar in Minneapolis
CANCELED
Seminar Information: Want to help protect your Supply Chain? Excellent class if you are considering CTPAT certification, preparing for re-validation or need to educate your group on your current CTPAT program. CTPAT is a voluntary public-private sector partnership program which recognizes that CBP can provide the highest level of cargo security only through close cooperation with the principle stakeholders of the international supply chain suc...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.