Service Contract Labor Standards: A Pra...
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. The Service Contract Labor Standards (SCLS), formerly the Service Contract Act, is one of the most challenging acts in federal contracting, and it is surrounded by a lot of misinformation. Our attorneys and instructors know the law. How Our Course Is Different: This is not a seminar taught by bureaucrats obligated to preach the DOL...
"Frauditing" Internal Controls to Preve...
Cybersecurity challenges demand that an organization face two facts. First, the protection of critical company and customer information is a business requirement to protect the company's reputation and enterprise value. Second, even the best programs will experience failure and expose some information the company would like to protect. We at Corporate Compliance Seminars believe confidence in security and privacy does not come from knowing not...
Demystifying Excel Pivot Tables
Overview: Pivot tables are one of the most powerful features of Microsoft Excel. They can provide quick answers from hundreds of thousands (even millions) of rows of data. With a few clicks you can aggregate, summarize and calculate large amounts of data to support you most critical business decisions. In fact, it's hard to call yourself proficient at Microsoft Excel without being able to comfortably create and modify pivot tables. Why should...
Digital Transformation in the IC: Techn...
Technological innovation is central to the intelligence profession. The National Counterintelligence and Security Center (NCSC) recently unveiled the National Counterintelligence Strategy of the United States of America 2020-2022, which features three principal trends that characterize today’s counterintelligence threat landscape: The number of threat actors targeting the U.S. is growing. These threat actors have increasingly sophisticat...
May 5, 2020
Organizer:
FEDINSIDER Location:
Webcast
Understanding Cybersecurity Risks
Cybersecurity challenges demand that an organization face two facts. First, the protection of critical company and customer information is a business requirement to protect the company's reputation and enterprise value. Second, even the best programs will experience failure and expose some information the company would like to protect. We at Corporate Compliance Seminars believe confidence in security and privacy does not come from knowing not...
Data Breaches: Defending Against and Re...
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome. What You Will Learn In this one day conference attendees will learn: Now What? WFH – How Do We Adapt a...
Protect Texas Elections: Cyber Security...
Election security is a top priority for Texas officials as they continue to leverage forward-thinking cyber security measures to improve our state's election systems. Join FireEye for an informational webinar to learn more on how to further safeguard our elections infrastructure against malicious cyber activity. This session will both share those best practices and offer insight into how local officials can secure their elections. Can't make t...
COVID-19 - HR Compliance Risks
Topic :COVID-19 - HR Compliance Risks Register :https://www.ijonaskills.us/webinarDetails?webinarid=707&speakerid=195&domain=1&source=GE_RD Discount Coupon : Use this Coupon (NEW2COMPLIANCE) and get (10% Off) On New Signup Overview: This webinar will cover the most current and common HR compliance challenges facing employers right now, managing remote workplaces, safety concerns, administering the new COVID-19 Leave, wage and hour...
A New Data Management Approach
Leadership and decision-makers are losing visibility of their budgets across mission-critical projects to ensure compliance. As agencies today face and experiencing extreme scrutiny on their spending budgets, with the added challenges of understanding and integrating data from many portfolios, strategic plans and enterprise architecture are failing. Register today, to learn how InQuisient’s Data Management approach to enterprise planning...
How to Start (or Revive) an EA Program:...
CANCELED
Organizations recognize successful enterprise architecture programs as an integral part of delivering value by helping to reduce confusion and unnecessary complexity resulting from issues such as functional silos, disjointed strategy, duplication of effort, poor integration and more. However, establishing an EA practice that is valued by the organization is difficult. More often than not, existing programs fail, or new programs don’t rea...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.